-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5441-1
security@debian.org https://www.debian.org/security/ Aron Xu
June 29, 2023
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : maradns
CVE ID : CVE-2022-30256 CVE-2023-31137
Debian Bug : 1033252 1035936
Brief introduction
Two vulnerbilities were found in maradns, an open source domain name
system (DNS) implementation, that may lead to denial of service and
unintended domain name resolution.
For the oldstable distribution (bullseye), these problems have been fixed
in version 2.0.13-1.4+deb11u1.
We recommend that you upgrade your maradns packages.
For the detailed security status of maradns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/maradns
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmSc6j4ACgkQO1LKKgqv 2VSQLgf/Tn5pYOeHQDp4pK8nzpQ4FgIZkbxmsjvuzT3SEX637sDWz2hAfbeIWxjw w0KbZnkdQIkPOWh6s5jZ3W4hvU7S+nhPjGiU88PXvGAyYItvU2QfaEXWzy4wwLBl Pfuh8CiVJxREyvEk9sjZCGr/VqwQyY0ttYqbkpmx0cscm7MpdWBa7WsFFh19bNXU D3tWs0RPH0V5HNOwuBiay0uFh0V2o4PAssR8qaYeDfW2QQT5i1uf2wyW+Bq7IYUs xvMUKo3iRPQ9pX/nnpj0+ZyG/Mtn6tI8F0gMt/LS6LiAyQz/D7EdBguUJ56LZ/on iquCYAyAfnDwNRat66CEEpZpMXN0Xw==
=eb0N
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)