Unsubscribe
On Fri, May 17, 2024 at 11:35 PM Santiago Ruano Rincón <
santi...@freexian.com> wrote:
> -
> Debian LTS Advisory DLA-3816-1debian-lts@lists.debian.org
> https://www.debian.org/lts/security/
Le 19/03/2022 à 14:26, Markus Koschany a écrit :
Am Samstag, dem 19.03.2022 um 10:55 +0100 schrieb Christopher Huhn:
Hi y'all
It looks like the bind9 security update for Stretch is severely broken,
cf. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007945
We had to emergency downgra
On Sat, Mar 19, 2022 at 12:04:32AM +0100, Markus Koschany wrote:
> -
> Debian LTS Advisory DLA-2955-1debian-lts@lists.debian.org
> https://www.debian.org/lts/security/ Markus Koschany
> Marc
Le 19/03/2022 à 14:26, Markus Koschany a écrit :
Thanks for the report. I have found the reason for the regression and I will
release an update shortly.
This is good news. Thanks a lot.
Am Samstag, dem 19.03.2022 um 10:55 +0100 schrieb Christopher Huhn:
> Hi y'all
>
> It looks like the bind9 security update for Stretch is severely broken,
> cf. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007945
>
> We had to emergency downgrade to get our DN
Hello,
Same issue after the upgrade to 1:9.10.3.dfsg.P4-12.3+deb9u11.
Debian Release: 9.13
Architecture: i386 (i686)
My BIND9 configuration includes views, master zones and forwarders.
It seems that the error happens at the first query.
Log :
Mar 19 10:22:10 zenith named[26756]: all zones load
Hi y'all
It looks like the bind9 security update for Stretch is severely broken,
cf. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007945
We had to emergency downgrade to get our DNS servers working again.
Best
Christopher
Hi Anton,
On Wed, May 5, 2021 at 12:51 AM Anton Gladky wrote:
> I have added autopkgtest to the stretch-version of bind9 [1].
> And the pipelines passed [2].
Perfect, it matches what I have here. Thanks, I'll add them with the
next update.
- u
I have added autopkgtest to the stretch-version of bind9 [1].
And the pipelines passed [2].
Feel free to commit there the following versions.
[1]
https://salsa.debian.org/lts-team/packages/bind9/-/tree/master-stretch/debian/tests
[2] https://salsa.debian.org/lts-team/packages/bind9/-/jobs/1620698
Hello,
On Mon, May 3, 2021 at 5:47 PM Emilio Pozuelo Monfort wrote:
> I have prepared a security update for LTS for the recent bind9 CVEs. I have
> done
> some testing on them, but if someone can give them some additional testing
> that'd be great.
If it still helps, I had set up a DNS server,
On 04/05/2021 07:30, Anton Gladky wrote:
Hi Emilio,
I have prepared a repo for bind9-lts-upload and salsa pipelines are passed
[2].
I needed to disable blhc-test though, but it should not be fixed by targeted
security upload.
[1] https://salsa.debian.org/lts-team/packages/bind9
[2] https://sals
Hi Emilio,
I have prepared a repo for bind9-lts-upload and salsa pipelines are passed
[2].
I needed to disable blhc-test though, but it should not be fixed by targeted
security upload.
[1] https://salsa.debian.org/lts-team/packages/bind9
[2] https://salsa.debian.org/lts-team/packages/bind9/-/pipe
Hi,
I have prepared a security update for LTS for the recent bind9 CVEs. I have done
some testing on them, but if someone can give them some additional testing
that'd be great. The packages can be found at:
https://people.debian.org/~pochu/lts/bind9/
Thanks!
Emilio
Hi John,
On Wed, 20 Jan 2016, li...@cloned.org.uk wrote:
Has it been uploaded?
it has been uploaded, but there was a problem with a server distributing
the packages and so it didn't reach the mirrors yet. But I assume in the
next few hours the package will be available.
Thorsten
21:52:24 +
From: Salvatore Bonaccorso
Reply-To: debian-lts@lists.debian.org
To: debian-lts-annou...@lists.debian.org
Subject: [SECURITY] [DLA 396-1] bind9 security update
Resent-Date: Tue, 19 Jan 2016 21:52:39 + (UTC)
Resent-From: debian-lts-annou...@lists.debian.org
-BEGIN PGP S
15 matches
Mail list logo