Two vulnerabilities have been discovered in BIND9, the Berkeley
Internet Name Domain server. The first relates to SIG query
processing and the second relates to a condition that can trigger an
INSIST failure, both lead to a denial of service.
For the stable distribution (sarge) these problems have been fixed in
version 9.2.4-1sarge1.
For the unstable distribution (sid) these problems have been fixed in
version 9.3.2-P1-1.
We recommend that you upgrade your bind9 package.