Debian dla-4226 : dns-root-data - security update

high Nessus Plugin ID 240283

Synopsis

The remote Debian host is missing a security-related update.

Description

The remote Debian 11 host has a package installed that is affected by a vulnerability as referenced in the dla-4226 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4226-1 [email protected] https://www.debian.org/lts/security/ Sylvain Beucler June 23, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : dns-root-data Version : 2024071801~deb11u1 Debian Bug : #1076995

The dns-root-data package contains DNS root zone data as published by IANA to be used as initial source by DNS software. This release adds the DNSKEY record for the KSK-2024 trust anchor. This new key is planned for use starting October 2026, and the previous one (KSK-2017) should be revoked January 2027, leaving time to propagate the new trust anchor, or roll to it sooner in case of emergency.

For Debian 11 bullseye, this problem has been fixed in version 2024071801~deb11u1.

We recommend that you upgrade your dns-root-data packages.

For the detailed security status of dns-root-data please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/dns-root-data

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the dns-root-data packages.

See Also

http://www.nessus.org/u?55b375dc

https://packages.debian.org/source/bullseye/dns-root-data

Plugin Details

Severity: High

ID: 240283

File Name: debian_DLA-4226.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/23/2025

Updated: 6/23/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:dns-root-data

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 6/23/2025

Vulnerability Publication Date: 6/23/2025