Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5621-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5621-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation, which may result in denial of service.
- systems | linux[9], debian[10]
- advisories | CVE-2023-4408[11], CVE-2023-50387[12], CVE-2023-50868[13], CVE-2023-5517[14], CVE-2023-5679[15], CVE-2023-6516[16]
- SHA-256 |
c8c07e1985655854dd15f5e76e52c42de91372742f9064ab63788fb3a08e6280
- Download[17] | Favorite[18] | View[19]
Change Mirror[20] Download[21]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5621-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Moritz Muehlenhoff
February 14, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bind9
CVE ID : CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-6516
CVE-2023-50387 CVE-2023-50868
Several vulnerabilities were discovered in BIND, a DNS server
implementation, which may result in denial of service.
For the oldstable distribution (bullseye), these problems have been fixed
in version 1:9.16.48-1.
For the stable distribution (bookworm), these problems have been fixed in
version 1:9.18.24-1.
We recommend that you upgrade your bind9 packages.
For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmXMcl8ACgkQEMKTtsN8
TjZIvg//cFDic8ui1mjgizp0lnhPN3ckeYRMWPVXCdq6MZR8JOOB5q2EGd+dBhDm
TOI2ZCPXzjmFRywwkAVowf5iGVT9cczSXyUUr773w4B9MdYAvVc/RZOZVQtz/45w
/qnj+sx7drh71ffkQmGf6xJz1hj6NwBK6faprNmyA81gTVvoE2aDBfY5d2gRa0m/
xKSVbO+DN2Tmh9wAMqXyf+pSQjUNopllUaEo1otLP1TRA/5LnL2UrLiCt0B7Jn9q
3QdrYDS9hke9+p9uuoWEIpS/oiNlxnL2bxE4CdAWy93J6qllSUfJo4RQbIcgySCr
dESH7fvCk3walvIkq6mQldB6M5JDUYrY/j0IkA/HptIx3R3+CbBJYu/5ark7/XHV
KaTzw5aoerv8JK8NljRlXuG86r/lTjRmObr7WiHBssxgsenfrGcAyXQoKusRwZAS
gbzh6CiZmg9Ihaqf1DixQ5R/9G/qlyQWDIfXVpevmyBmYPHKymIK2fMHjXTqF/6x
BzwzmuKQJGm4Gf4X9gYmvMNx9gh6dqK+hJf6/3ifzuZ4Wx5XMp2ZnlRBENvVfzF/
Kk07ej+1UE8QcYAdNSynXQqFmo5+kfGHemtZRmKzqECPJoVYFSWJ09FTXsXo/8je
0wDkgZfhuaQ7lhfiXEztFz2dmzOrlc18NUSXyaWhzQFHqP53fQc=
=mhef
-----END PGP SIGNATURE-----
File Tags
- ActiveX[27] (932)
- Advisory[28] (84,163)
- Arbitrary[29] (16,533)
- BBS[30] (2,859)
- Bypass[31] (1,811)
- CGI[32] (1,031)
- Code Execution[33] (7,544)
- Conference[34] (686)
- Cracker[35] (844)
- CSRF[36] (3,368)
- DoS[37] (24,302)
- Encryption[38] (2,380)
- Exploit[39] (52,521)
- File Inclusion[40] (4,242)
- File Upload[41] (982)
- Firewall[42] (822)
- Info Disclosure[43] (2,826)
- Intrusion Detection[44] (905)
- Java[45] (3,112)
- JavaScript[46] (885)
- Kernel[47] (6,917)
- Local[48] (14,637)
- Magazine[49] (586)
- Overflow[50] (12,969)
- Perl[51] (1,430)
- PHP[52] (5,170)
- Proof of Concept[53] (2,362)
- Protocol[54] (3,682)
- Python[55] (1,588)
- Remote[56] (31,227)
- Root[57] (3,613)
- Rootkit[58] (519)
- Ruby[59] (616)
- Scanner[60] (1,647)
- Security Tool[61] (7,959)
- Shell[62] (3,227)
- Shellcode[63] (1,216)
- Sniffer[64] (898)
- Spoof[65] (2,236)
- SQL Injection[66] (16,473)
- TCP[67] (2,420)
- Trojan[68] (688)
- UDP[69] (896)
- Virus[70] (668)
- Vulnerability[71] (32,413)
- Web[72] (9,827)
- Whitepaper[73] (3,764)
- x86[74] (966)
- XSS[75] (18,110)
- Other[76]
File Archives
- February 2024[77]
- January 2024[78]
- December 2023[79]
- November 2023[80]
- October 2023[81]
- September 2023[82]
- August 2023[83]
- July 2023[84]
- June 2023[85]
- May 2023[86]
- April 2023[87]
- March 2023[88]
- Older[89]
Systems
- AIX[90] (429)
- Apple[91] (2,060)
- BSD[92] (375)
- CentOS[93] (57)
- Cisco[94] (1,926)
- Debian[95] (6,965)
- Fedora[96] (1,693)
- FreeBSD[97] (1,246)
- Gentoo[98] (4,441)
- HPUX[99] (880)
- iOS[100] (369)
- iPhone[101] (108)
- IRIX[102] (220)
- Juniper[103] (69)
- Linux[104] (48,579)
- Mac OS X[105] (691)
- Mandriva[106] (3,105)
- NetBSD[107] (256)
- OpenBSD[108] (487)
- RedHat[109] (15,089)
- Slackware[110] (941)
- Solaris[111] (1,611)
- SUSE[112] (1,444)
- Ubuntu[113] (9,282)
- UNIX[114] (9,367)
- UnixWare[115] (187)
- Windows[116] (6,623)
- Other[117]
- Services
- Security Services[128]
- Hosting By
- Rokasec[129]
Read more https://packetstormsecurity.com/files/177134/dsa-5621-1.txt