[Git][security-tracker-team/security-tracker][master] Track fixed version for bind9 via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Feb 14 22:12:51 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4cfdee7c by Salvatore Bonaccorso at 2024-02-14T23:06:33+01:00
Track fixed version for bind9 via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -646,18 +646,18 @@ CVE-2023-31346 (Failure to initialize memory in SEV Firmware may allow a privile
TODO: check
CVE-2023-4408 (The DNS message parsing code in `named` includes a section whose compu ...)
{DSA-5621-1}
- - bind9 <unfixed>
+ - bind9 1:9.19.21-1
NOTE: https://kb.isc.org/docs/cve-2023-4408
CVE-2023-5517 (A flaw in query-handling code can cause `named` to exit prematurely wi ...)
{DSA-5621-1}
- - bind9 <unfixed>
+ - bind9 1:9.19.21-1
NOTE: https://kb.isc.org/docs/cve-2023-5517
CVE-2023-5679 (A bad interaction between DNS64 and serve-stale may cause `named` to c ...)
{DSA-5621-1}
- - bind9 <unfixed>
+ - bind9 1:9.19.21-1
NOTE: https://kb.isc.org/docs/cve-2023-5679
CVE-2023-6516 (To keep its cache database efficient, `named` running as a recursive r ...)
- - bind9 1:9.17.19-1
+ - bind9 1:9.19.21-1
[bullseye] - bind9 1:9.16.48-1
[buster] - bind9 <not-affected> (Vulnerable code only in 9.16.y series)
NOTE: https://kb.isc.org/docs/cve-2023-6516
@@ -665,7 +665,7 @@ CVE-2023-6516 (To keep its cache database efficient, `named` running as a recurs
NOTE: which entered unstable as the fixed version as workaround.
CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RF ...)
{DSA-5621-1 DSA-5620-1}
- - bind9 <unfixed>
+ - bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
- pdns-recursor 4.9.3-1 (bug #1063852)
@@ -679,7 +679,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and rela
NOTE: Fixed by: https://github.com/NLnetLabs/unbound/commit/882903f2fa800c4cb6f5e225b728e2887bb7b9ae (release-1.19.1)
CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...)
{DSA-5621-1 DSA-5620-1}
- - bind9 <unfixed>
+ - bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
- pdns-recursor 4.9.3-1 (bug #1063852)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4cfdee7cfe4161f0aebc4592a0e466ace4adaf03
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4cfdee7cfe4161f0aebc4592a0e466ace4adaf03
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240214/7d47852e/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list