[Git][security-tracker-team/security-tracker][master] Track fixed version for bind9 via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Feb 14 22:12:51 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4cfdee7c by Salvatore Bonaccorso at 2024-02-14T23:06:33+01:00
Track fixed version for bind9 via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -646,18 +646,18 @@ CVE-2023-31346 (Failure to initialize memory in SEV Firmware may allow a privile
 	TODO: check
 CVE-2023-4408 (The DNS message parsing code in `named` includes a section whose compu ...)
 	{DSA-5621-1}
-	- bind9 <unfixed>
+	- bind9 1:9.19.21-1
 	NOTE: https://kb.isc.org/docs/cve-2023-4408
 CVE-2023-5517 (A flaw in query-handling code can cause `named` to exit prematurely wi ...)
 	{DSA-5621-1}
-	- bind9 <unfixed>
+	- bind9 1:9.19.21-1
 	NOTE: https://kb.isc.org/docs/cve-2023-5517
 CVE-2023-5679 (A bad interaction between DNS64 and serve-stale may cause `named` to c ...)
 	{DSA-5621-1}
-	- bind9 <unfixed>
+	- bind9 1:9.19.21-1
 	NOTE: https://kb.isc.org/docs/cve-2023-5679
 CVE-2023-6516 (To keep its cache database efficient, `named` running as a recursive r ...)
-	- bind9 1:9.17.19-1
+	- bind9 1:9.19.21-1
 	[bullseye] - bind9 1:9.16.48-1
 	[buster] - bind9 <not-affected> (Vulnerable code only in 9.16.y series)
 	NOTE: https://kb.isc.org/docs/cve-2023-6516
@@ -665,7 +665,7 @@ CVE-2023-6516 (To keep its cache database efficient, `named` running as a recurs
 	NOTE: which entered unstable as the fixed version as workaround.
 CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RF ...)
 	{DSA-5621-1 DSA-5620-1}
-	- bind9 <unfixed>
+	- bind9 1:9.19.21-1
 	- dnsmasq 2.90-1
 	- knot-resolver 5.7.1-1
 	- pdns-recursor 4.9.3-1 (bug #1063852)
@@ -679,7 +679,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and rela
 	NOTE: Fixed by: https://github.com/NLnetLabs/unbound/commit/882903f2fa800c4cb6f5e225b728e2887bb7b9ae (release-1.19.1)
 CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...)
 	{DSA-5621-1 DSA-5620-1}
-	- bind9 <unfixed>
+	- bind9 1:9.19.21-1
 	- dnsmasq 2.90-1
 	- knot-resolver 5.7.1-1
 	- pdns-recursor 4.9.3-1 (bug #1063852)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4cfdee7cfe4161f0aebc4592a0e466ace4adaf03

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4cfdee7cfe4161f0aebc4592a0e466ace4adaf03
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240214/7d47852e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list