Debian 9858 Published by

The following Debian updates has been released:

[DSA 3702-1] tar security update
[DSA 3703-1] bind9 security update



[DSA 3702-1] tar security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3702-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 01, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tar
CVE ID : CVE-2016-6321
Debian Bug : 842339

Harry Sintonen discovered that GNU tar does not properly handle member
names containing '..', thus allowing an attacker to bypass the path
names specified on the command line and replace files and directories in
the target directory.

For the stable distribution (jessie), this problem has been fixed in
version 1.27.1-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.29b-1.1.

We recommend that you upgrade your tar packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3703-1] bind9 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3703-1 security@debian.org
https://www.debian.org/security/ Florian Weimer
November 01, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : bind9
CVE ID : CVE-2016-8864
Debian Bug : 842858

Tony Finch and Marco Davids reported an assertion failure in BIND, a
DNS server implementation, which causes the server process to
terminate. This denial-of-service vulnerability is related to a
defect in the processing of responses with DNAME records from
authoritative servers and primarily affects recursive resolvers.

For the stable distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-9+deb8u8.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/