summaryrefslogtreecommitdiffstats
path: root/doc/notes/notes-9.16.22.rst
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 23:51:28 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-27 23:51:28 +0000
commit3a8f8bef7340cf47837e9bb89b7a24d3844005ec (patch)
treebe267b16d2782cfdbd4781cbde4cc712308faf6f /doc/notes/notes-9.16.22.rst
parentAdding upstream version 1:9.16.44. (diff)
downloadbind9-3a8f8bef7340cf47837e9bb89b7a24d3844005ec.tar.xz
bind9-3a8f8bef7340cf47837e9bb89b7a24d3844005ec.zip
Adding upstream version 1:9.16.48.upstream/1%9.16.48upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'doc/notes/notes-9.16.22.rst')
-rw-r--r--doc/notes/notes-9.16.22.rst2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/notes/notes-9.16.22.rst b/doc/notes/notes-9.16.22.rst
index 3403ee6..5356099 100644
--- a/doc/notes/notes-9.16.22.rst
+++ b/doc/notes/notes-9.16.22.rst
@@ -26,7 +26,7 @@ Security Fixes
that has a negligible impact on resolver performance while also
preventing abuse. Administrators may observe more traffic towards
servers issuing certain types of broken responses than in previous
- BIND 9 releases, depending on client query patterns. (CVE-2021-25219)
+ BIND 9 releases, depending on client query patterns. :cve:`2021-25219`
ISC would like to thank Kishore Kumar Kothapalli of Infoblox for
bringing this vulnerability to our attention. :gl:`#2899`