it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5620-1] unbound security update
- Date: Wed, 14 Feb 2024 06:49:05 +0000
- List-archive: https://lists.debian.org/msgid-search/E1ra94r-009GU7-7c AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=ukn65D8o3Wy/GfXK/DqfsaUfSU4FJKDCnw0iY+ubPJM=; b=sX FN5ebYWljFoINv7nsUYEwC7+tmVQchBYQd7pO9pn1axmW14YKwBm6Vqh4EX0CM9vE+guSynHOIzaT fu+7tW3+ZZ8/3oI8eeXylT/LPqDmKVJVXIEar8B201tBt2HpafV+DevYfuRApHlmVMqwh6NOYy0bB ZZydfhLq+hEC3auQylJ8eof7PTtfOPMo+f9bzdwtiWsBwCgQEqIOBm3+yJbNF8TbrgiQaNaBS8VwO pyZ2o3sSreTZRTqQ52n/khK4IiLb1wdYGa9rZgHZSyJF1I3+nMdWeVTD0Xqv/IN8M9bHf26I2j/XW ky80tSjs1tOAVSCqoiQ5RclIkFz12i6g==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Wed, 14 Feb 2024 06:49:32 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <SMS1MLQrbUG.A.4zG.8JGzlB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5620-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 14, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : unbound
CVE ID : CVE-2023-50387 CVE-2023-50868
Debian Bug : 1063845
Two vulnerabilities were discovered in unbound, a validating, recursive,
caching DNS resolver. Specially crafted DNSSEC answers could lead
unbound down a very CPU intensive and time costly DNSSEC
(CVE-2023-50387) or NSEC3 hash (CVE-2023-50868) validation path,
resulting in denial of service.
Details can be found at
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
For the oldstable distribution (bullseye), these problems have been fixed
in version 1.13.1-1+deb11u2.
For the stable distribution (bookworm), these problems have been fixed in
version 1.17.1-2+deb12u2.
We recommend that you upgrade your unbound packages.
For the detailed security status of unbound please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/unbound
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=m2j/
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5620-1] unbound security update, Salvatore Bonaccorso, 14.02.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.