Errata overview
Errata ID 123
Date 2017-08-09
Source package bind9
Fixed in version 1:9.9.5.dfsg-9+deb8u13A~4.2.1.201708081700
Description
This update addresses the following issues:
* denial of service (assertion failure and daemon exit) via a crafted query
  (CVE-2016-2776)
* denial of service (daemon crash) via a long request that uses the
  lightweight resolver protocol (not active in UCS, CVE-2016-2775)
* denial of service (assertion failure and daemon exit) via a DNAME record
  in the answer section of a response to a recursive query, related to
  db.c and resolver.c (CVE-2016-8864)
* denial of service (assertion failure and daemon exit) via malformed
  response to an RTYPE ANY query (CVE-2016-9131)
* denial of service (assertion failure and daemonexit) via response
   containing an inconsistency among DNSSEC-related RRsets (CVE-2016-9147)
* denial of service (assertion failure and daemon exit) via crafted DS
  resource record in an answer (CVE-2016-9444)
* An error in TSIG authentication can permit unauthorized zone transfers
  (CVE-2017-3142)
* An error in TSIG authentication can permit unauthorized dynamic updates
  (CVE-2017-3143)
* An error handling synthesized records could cause an assertion failure
  when using DNS64 with "break-dnssec yes;" (CVE-2017-3136)
* A response packet can cause a resolver to terminate when processing an
  answer containing a CNAME or DNAME (CVE-2017-3137)
* named exits with a REQUIRE assertion failure if it receives a null
  command string on its control channel (CVE-2017-3138)
* Assertion failure when using DNS64 and RPZ can lead to crash
  (CVE-2017-3135)
Additional notes
CVE ID CVE-2016-2775
CVE-2016-2776
CVE-2016-8864
CVE-2016-9131
CVE-2016-9147
CVE-2016-9444
CVE-2017-3142
CVE-2017-3143
CVE-2017-3136
CVE-2017-3137
CVE-2017-3138
CVE-2017-3135
UCS Bug number #44656