DSA-2244-1 bind9 -- incorrect boundary condition

Related Vulnerabilities: CVE-2011-1910  

It was discovered that BIND, an implementation of the DNS protocol, does not correctly process certain large RRSIG record sets in DNSSEC responses. The resulting assertion failure causes the name server process to crash, making name resolution unavailable. (CVE-2011-1910) In addition, this update fixes handling of certain signed/unsigned zone combinations when a DLV service is used. Previously, data from certain affected zones could become unavailable from the resolver. For the oldstable distribution (lenny), this problem has been fixed in version 1:9.6.ESV.R4+dfsg-0+lenny2. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze2. The testing distribution (wheezy) and the unstable distribution (sid) will be fixed soon. We recommend that you upgrade your bind9 packages.

Debian Security Advisory

DSA-2244-1 bind9 -- incorrect boundary condition

Date Reported:
27 May 2011
Affected Packages:
bind9
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2011-1910.
More information:

It was discovered that BIND, an implementation of the DNS protocol, does not correctly process certain large RRSIG record sets in DNSSEC responses. The resulting assertion failure causes the name server process to crash, making name resolution unavailable. (CVE-2011-1910)

In addition, this update fixes handling of certain signed/unsigned zone combinations when a DLV service is used. Previously, data from certain affected zones could become unavailable from the resolver.

For the oldstable distribution (lenny), this problem has been fixed in version 1:9.6.ESV.R4+dfsg-0+lenny2.

For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze2.

The testing distribution (wheezy) and the unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your bind9 packages.