bind9 1:9.18.7-1 source package in Debian
Changelog
bind9 (1:9.18.7-1) unstable; urgency=medium * New upstream version 9.18.7 - CVE-2022-2795: Processing large delegations may severely degrade resolver performance - CVE-2022-2881: Buffer overread in statistics channel code - CVE-2022-2906: Memory leaks in code handling Diffie-Hellman key exchange via TKEY RRs (OpenSSL 3.0.0+ only) - CVE-2022-3080: BIND 9 resolvers configured to answer from stale cache with zero stale-answer-client-timeout may terminate unexpectedly - CVE-2022-38177: Memory leak in ECDSA DNSSEC verification code - CVE-2022-38178: Memory leaks in EdDSA DNSSEC verification code -- Ondřej Surý <email address hidden> Wed, 21 Sep 2022 12:48:36 +0200
Upload details
- Uploaded by:
- Debian DNS Team
- Uploaded to:
- Sid
- Original maintainer:
- Debian DNS Team
- Architectures:
- any all
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
bind9_9.18.7-1.dsc | 3.2 KiB | 9011d9c82efdd9e5d201ba0a5979ba89d705849f8cf711cb2ec9399e26044a11 |
bind9_9.18.7.orig.tar.xz | 5.4 MiB | 9e2acf1698f49d70ad12ffbad39ec6716a7da524e9ebd98429c7c70ba1262981 |
bind9_9.18.7.orig.tar.xz.asc | 833 bytes | b2a3f2f4df04a715efa13da4837ff4f29aa01700d341ce8078fafe9747b62246 |
bind9_9.18.7-1.debian.tar.xz | 77.6 KiB | f1a1aba86ac49ee94d03f66e0c84e64420c06959a645e6fa2de0ca61d7794e21 |
No changes file available.