[SECURITY] [DSA 3763-1] pdns-recursor security update

ID DEBIAN:DSA-3763-1:A4145
Type debian
Reporter Debian
Modified 2017-01-13T16:31:17


Debian Security Advisory DSA-3763-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso January 13, 2017 https://www.debian.org/security/faq

Package : pdns-recursor CVE ID : CVE-2016-7068

Florian Heinz and Martin Kluge reported that pdns-recursor, a recursive DNS server, parses all records present in a query regardless of whether they are needed or even legitimate, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the pdns server, resulting in a partial denial of service if the system becomes overloaded.

For the stable distribution (jessie), this problem has been fixed in version 3.6.2-2+deb8u3.

We recommend that you upgrade your pdns-recursor packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org