-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3726-1 [email protected] https://www.debian.org/lts/security/ Thorsten Alteholz January 30, 2024 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : bind9 Version : 1:9.11.5.P4+dfsg-5.1+deb10u10 CVE ID : CVE-2023-3341 An issue has been discovered in BIND, a DNS server implementation. A stack exhaustion flaw was discovered in the control channel code which may result in denial of service (named daemon crash). For Debian 10 buster, this problem has been fixed in version 1:9.11.5.P4+dfsg-5.1+deb10u10. We recommend that you upgrade your bind9 packages. For the detailed security status of bind9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bind9 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmW5bZ1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7 WEeKkw//ZeSVQxgqJj2HxoOfG/aGcfl71RYnHINDg5J7i+Po7YSTQ+gFLPA/btOD 8FRFsHF7LK/lc1JHiS1ZSvKbIaHg5sM/idaPASHjVztdzYQorTLoUr3uVHWpSfP9 CzKyjlQZQv6HossMeCyR0vrH7pMolOZdCm1EyhRJIGGHsNSJgIrshqnV2VBaF198 LZYtemyOPOQgtavJdFk4ca74iPnaNTPLZwBlvzVuTKLNb2e7WbWm1luf8ZsSPEKl PiSRDW9zYMAamB3neczZ05pBbdQ3tvsRikC5tNkQfWHDujhvpTfZYXh3Tjq6V9N/ eaPZh+AttGhMKo7E4S+vN+W29t1W+D2f0yJtqxfiNofX3c4vXBGk714THRIa/w/o t6tkOXeaMo5J7lvWnBseVPp/QwPFhzSgDh3NXsiCSifm3uD2C5jrpquO/rDYBpF7 W632tDXcUsUoSU89AnM5GFuG5gb2n6riLT5Awy9Jt+Jh98eoPi0sIGpsfHcP9QRQ Obs1TTXuppitcjnwd6pxN5yotoVTsH2SVs+EX5Ds0AApTY06EH2avgb5uW4+4STL /awoEChZeti810zN6rt1TwSr0oG0eZ2MHbEFg0gh3wDELdLywic49BNiUg4UCc2m J0gb/jHQ/iQbe27z/d4ZINWQTtVq6tyKvFPpQQsNSb0ZujtvHPQ= =Nq/3 -----END PGP SIGNATURE-----
