summaryrefslogtreecommitdiffstats
path: root/doc/notes/notes-9.18.19.rst
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-08 16:41:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-08 16:41:29 +0000
commite2fc8e037ea6bb5de92b25ec9c12a624737ac5ca (patch)
tree65e6bbf5e12c3fe09b43e577f8d1786d06bcd559 /doc/notes/notes-9.18.19.rst
parentReleasing progress-linux version 1:9.18.19-1~deb12u1progress7u1. (diff)
downloadbind9-e2fc8e037ea6bb5de92b25ec9c12a624737ac5ca.tar.xz
bind9-e2fc8e037ea6bb5de92b25ec9c12a624737ac5ca.zip
Merging upstream version 1:9.18.24.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'doc/notes/notes-9.18.19.rst')
-rw-r--r--doc/notes/notes-9.18.19.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/notes/notes-9.18.19.rst b/doc/notes/notes-9.18.19.rst
index 3d3c513..9c3ebd8 100644
--- a/doc/notes/notes-9.18.19.rst
+++ b/doc/notes/notes-9.18.19.rst
@@ -18,7 +18,7 @@ Security Fixes
- Previously, sending a specially crafted message over the control
channel could cause the packet-parsing code to run out of available
stack memory, causing :iscman:`named` to terminate unexpectedly.
- This has been fixed. (CVE-2023-3341)
+ This has been fixed. :cve:`2023-3341`
ISC would like to thank Eric Sesterhenn from X41 D-Sec GmbH for
bringing this vulnerability to our attention. :gl:`#4152`
@@ -26,7 +26,7 @@ Security Fixes
- A flaw in the networking code handling DNS-over-TLS queries could
cause :iscman:`named` to terminate unexpectedly due to an assertion
failure under significant DNS-over-TLS query load. This has been
- fixed. (CVE-2023-4236)
+ fixed. :cve:`2023-4236`
ISC would like to thank Robert Story from USC/ISI Root Server
Operations for bringing this vulnerability to our attention.