it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5329-1] bind9 security update
- Date: Thu, 26 Jan 2023 18:32:16 +0000
- Authentication-results: mail.piratenpartei.de; dkim=none; spf=none (mail.piratenpartei.de: domain of "bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org" has no SPF policy when checking 82.195.75.100) smtp.mailfrom="bounce-debian-security-announce=it-securitynotifies=lists.piratenpartei.de AT lists.debian.org"; dmarc=none
- List-archive: https://lists.debian.org/msgid-search/Y9LHMP8+FGVV8he2 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=S7uY32T7Yp+dpvjuYyh4/v+lCBLQR52HAxZA5FLy9w0=; b=IQ ObikDugo/mOW7W8W3arEANDEYVondPa/+07Cx7Gqt6vY22q0KmjhswNNYtrX4VZYMIQtUPb5W40g2 Q2JQp3IviP1sE4qC9zrWBosyY8fMOBLG8X18img9Fz9wrRGTVdcBC6V+NsAw4IWyepItt7OnbRovD 5cq15vNH7PfOhzgoI1KNB3kIx4SQfWypv9sQse6+4kOygReXGjlSaNj2PBBlJ0pG2YPlsaXalYHsw 4J60pFDgMaFbCuwbqYE2UQrGjmX6Xa7bp7s5QvCk8Z7Y+s2vPyHtcq3UbGJkzuo2V2tmpvhc0AR7A ltfzQ+O+FpOdUXdsG6CgjVUus5b+ZtfQ==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 26 Jan 2023 18:32:42 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <0_X33EUI5uB.A.QCG.Jds0jB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5329-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 26, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bind9
CVE ID : CVE-2022-3094 CVE-2022-3736 CVE-2022-3924
Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service against named.
For the stable distribution (bullseye), these problems have been fixed in
version 1:9.16.37-1~deb11u1.
We recommend that you upgrade your bind9 packages.
For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmPSxg4ACgkQEMKTtsN8
TjaEyw//bjGBSD6QFX5xfkXzm4fHKEBnl3/yg0z+p6ml3xGQQJaBzwljn4J2McGx
xtCsgOVTyyvy/uocUsK4X1LZk8kGfbbiGN+63o2PoADX76bPhbv69CiRxd1NRnpr
SMLsJyBHaiB8TFPFBnPz//Q7KY9KvhzUbv/g4ocIYmlrxUZiZmmyJB8kJ3lzFJIB
zThlcmnCLHjs4IDF516BJMywxYnsnSRc0G73jB1zlcmBB0loYpD3U434C+pUCMKk
rpYPeBFZHGikpYs7x+lJ95WmggYtoNjz0iPwpK1hd2vvM1rxr93jARKMTlKh5OMt
ljIK67NQeKfyojd4Uva49SAVYuo38MCLO2H4NEPPoEh+OGUJBgCagvwgye+GPOM+
c++Ii9LNqNdwEThG2WVVP4f/Hore27l4lswGICLk9662lSJsAnZtdTQUSvFbeI8k
8ne/2bvYrkZbCWDv8gPhLlCa6c80zag+ZzhOAvghBfj7AbRch/7feqe+RYAJ4qPu
HmEokpxGL9gboa/4y3YJeCSKv13xXbz13FJyPMpsfiLVCp6ajhE1iVL3Trkr4rUG
GmQVXClsBrDibeIu5YQvqnBtTZckrt8WoKo7GedrZxu/vrAqtwQVsL+7UrNUQbZL
cTTLwZRc/RRegsHBqptYu/+joV+8ndQ9G2wX/35ss8hd+uQ2wvE=
=/JXy
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5329-1] bind9 security update, Moritz Muehlenhoff, 26.01.2023
Archiv bereitgestellt durch MHonArc 2.6.24.