On Mon, Jan 28, 2013 at 07:37:03AM +0100, Moritz Muehlenhoff wrote:
> Package: bind9
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Please see https://kb.isc.org/article/AA-00855 for details.

Hello,

I'm providing a summary of the issue following my investigation as
a non-bind9 developer:

- a DoS (server crash with assertion failure) in a rare configuration
  involving both DNS64 and Response Policy Zones, when maintaining A
  rewrite rules but not AAAA rewrite rules
- the workaround is to make sure the RPZ contains a AAAA rewrite rule
  for every A rewrite rule
- there is no production-quality patch available upstream (but there is
  a patch in 9.8.5b1). "However, the suggested workaround is a complete
  remedy for those who are using DNS64 in conjunction with RPZ, and is
  recommended in preference to running beta code in a production
  environment."

Given these, I am not convinced that this should be RC for wheezy.
How about a NEWS item drawing attention to the issue and workaround,
and a downgrade to important?

Note: I was unable to find any public upstream VCS for BIND 9 so was
unable to easily find the relevant patch. Could the BIND 9 maintainers
comment on whether they would consider including the patch?

Cheers,
Dominic.

-- 
Dominic Hargreaves | http://www.larted.org.uk/~dom/
PGP key 5178E2A5 from the.earth.li (keyserver,web,email)


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to