summaryrefslogtreecommitdiffstats
path: root/doc/notes/notes-9.16.15.rst
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 23:51:28 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 23:51:28 +0000
commit3a8f8bef7340cf47837e9bb89b7a24d3844005ec (patch)
treebe267b16d2782cfdbd4781cbde4cc712308faf6f /doc/notes/notes-9.16.15.rst
parentAdding upstream version 1:9.16.44. (diff)
downloadbind9-upstream.tar.xz
bind9-upstream.zip
Adding upstream version 1:9.16.48.upstream/1%9.16.48upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'doc/notes/notes-9.16.15.rst')
-rw-r--r--doc/notes/notes-9.16.15.rst6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/notes/notes-9.16.15.rst b/doc/notes/notes-9.16.15.rst
index 0cc0f49..a4b71c3 100644
--- a/doc/notes/notes-9.16.15.rst
+++ b/doc/notes/notes-9.16.15.rst
@@ -16,14 +16,14 @@ Security Fixes
~~~~~~~~~~~~~~
- A malformed incoming IXFR transfer could trigger an assertion failure
- in ``named``, causing it to quit abnormally. (CVE-2021-25214)
+ in ``named``, causing it to quit abnormally. :cve:`2021-25214`
ISC would like to thank Greg Kuechle of SaskTel for bringing this
vulnerability to our attention. :gl:`#2467`
- ``named`` crashed when a DNAME record placed in the ANSWER section
during DNAME chasing turned out to be the final answer to a client
- query. (CVE-2021-25215)
+ query. :cve:`2021-25215`
ISC would like to thank `Siva Kakarla`_ for bringing this
vulnerability to our attention. :gl:`#2540`
@@ -37,7 +37,7 @@ Security Fixes
GSSAPI authentication). This flaw could be exploited to crash
``named`` binaries compiled for 64-bit platforms, and could enable
remote code execution when ``named`` was compiled for 32-bit
- platforms. (CVE-2021-25216)
+ platforms. :cve:`2021-25216`
This vulnerability was reported to us as ZDI-CAN-13347 by Trend Micro
Zero Day Initiative. :gl:`#2604`