Debian Security Advisory DSA-5621-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
February 14, 2024 https://www.debian.org/security/faq
Package : bind9
CVE ID : CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-6516
CVE-2023-50387 CVE-2023-50868
Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service.
For the oldstable distribution (bullseye), these problems have been fixed
in version 1:9.16.48-1.
For the stable distribution (bookworm), these problems have been fixed in
version 1:9.18.24-1.
We recommend that you upgrade your bind9 packages.
For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | bind9-doc | < 1:9.18.24-1 | bind9-doc_1:9.18.24-1_all.deb |
Debian | 12 | all | bind9-libs | < 1:9.18.24-1 | bind9-libs_1:9.18.24-1_all.deb |
Debian | 11 | all | bind9 | < 1:9.16.48-1 | bind9_1:9.16.48-1_all.deb |
Debian | 11 | all | bind9utils | < 1:9.16.48-1 | bind9utils_1:9.16.48-1_all.deb |
Debian | 12 | all | bind9-dev | < 1:9.18.24-1 | bind9-dev_1:9.18.24-1_all.deb |
Debian | 11 | all | bind9-dnsutils | < 1:9.16.48-1 | bind9-dnsutils_1:9.16.48-1_all.deb |
Debian | 12 | all | bind9-utils | < 1:9.18.24-1 | bind9-utils_1:9.18.24-1_all.deb |
Debian | 11 | all | bind9-doc | < 1:9.16.48-1 | bind9-doc_1:9.16.48-1_all.deb |
Debian | 12 | all | dnsutils | < 1:9.18.24-1 | dnsutils_1:9.18.24-1_all.deb |
Debian | 11 | all | bind9-utils | < 1:9.16.48-1 | bind9-utils_1:9.16.48-1_all.deb |