diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 23:51:29 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-27 23:51:29 +0000 |
commit | 113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc (patch) | |
tree | 76bbb508aac2452b17d73bcd162adc8cc7602e69 /doc/notes/notes-9.16.33.rst | |
parent | Releasing progress-linux version 1:9.16.44-1~deb11u1progress6u1. (diff) | |
download | bind9-113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc.tar.xz bind9-113ad32e9cd2dcda12f12aa8a72d56b73ff4f4cc.zip |
Merging upstream version 1:9.16.48.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'doc/notes/notes-9.16.33.rst')
-rw-r--r-- | doc/notes/notes-9.16.33.rst | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/notes/notes-9.16.33.rst b/doc/notes/notes-9.16.33.rst index 876aab8..6e152b5 100644 --- a/doc/notes/notes-9.16.33.rst +++ b/doc/notes/notes-9.16.33.rst @@ -18,7 +18,7 @@ Security Fixes - Previously, there was no limit to the number of database lookups performed while processing large delegations, which could be abused to severely impact the performance of :iscman:`named` running as a - recursive resolver. This has been fixed. (CVE-2022-2795) + recursive resolver. This has been fixed. :cve:`2022-2795` ISC would like to thank Yehuda Afek from Tel-Aviv University and Anat Bremler-Barr & Shani Stajnrod from Reichman University for bringing @@ -27,14 +27,14 @@ Security Fixes - :iscman:`named` running as a resolver with the ``stale-answer-client-timeout`` option set to ``0`` could crash with an assertion failure, when there was a stale CNAME in the cache for - the incoming query. This has been fixed. (CVE-2022-3080) :gl:`#3517` + the incoming query. This has been fixed. :cve:`2022-3080` :gl:`#3517` - A memory leak was fixed that could be externally triggered in the - DNSSEC verification code for the ECDSA algorithm. (CVE-2022-38177) + DNSSEC verification code for the ECDSA algorithm. :cve:`2022-38177` :gl:`#3487` - Memory leaks were fixed that could be externally triggered in the - DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178) + DNSSEC verification code for the EdDSA algorithm. :cve:`2022-38178` :gl:`#3487` Feature Changes |