ELA-418-1 bind9 security update
Package bind9
ELA-418-1 bind9 security update
Version 1:9.9.5.dfsg-9+deb8u22
Related CVEs CVE-2021-25214 CVE-2021-25215 CVE-2021-25216
Several vulnerabilities were discovered in BIND, a DNS server implementation.
CVE-2021-25214
Greg Kuechle discovered that a malformed incoming IXFR transfer
could trigger an assertion failure in named, resulting in denial
of service.
CVE-2021-25215
Siva Kakarla discovered that named could crash when a DNAME record
placed in the ANSWER section during DNAME chasing turned out to be
the final answer to a client query.
CVE-2021-25216
It was discovered that the SPNEGO implementation used by BIND is
prone to a buffer overflow vulnerability. This update switches to
use the SPNEGO implementation from the Kerberos libraries.
For Debian 8 jessie, these problems have been fixed in version 1:9.9.5.dfsg-9+deb8u22.
We recommend that you upgrade your bind9 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/
A bind9 security update has been released for Debian GNU/Linux 8 Extended LTS to address several vulnerabilities.