diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 23:51:29 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 23:51:29 +0000 |
commit | 113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc (patch) | |
tree | 76bbb508aac2452b17d73bcd162adc8cc7602e69 /doc/notes/notes-9.16.12.rst | |
parent | Releasing progress-linux version 1:9.16.44-1~deb11u1progress6u1. (diff) | |
download | bind9-113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc.tar.xz bind9-113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc.zip |
Merging upstream version 1:9.16.48.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'doc/notes/notes-9.16.12.rst')
-rw-r--r-- | doc/notes/notes-9.16.12.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/notes/notes-9.16.12.rst b/doc/notes/notes-9.16.12.rst index d236f5e..30e84cb 100644 --- a/doc/notes/notes-9.16.12.rst +++ b/doc/notes/notes-9.16.12.rst @@ -22,7 +22,7 @@ Security Fixes authentication). This flaw could be exploited to crash ``named``. Theoretically, it also enabled remote code execution, but achieving the latter is very difficult in real-world conditions. - (CVE-2020-8625) + :cve:`2020-8625` This vulnerability was responsibly reported to us as ZDI-CAN-12302 by Trend Micro Zero Day Initiative. :gl:`#2354` |