Thanks for the nudge.  I must be tired or something as I totally forgot about 
updating
the versions in upstream Debian. I'm working on it right now.

Ondrej
--
Ondřej Surý (He/Him)
ond...@sury.org

> On 21. 9. 2023, at 19:23, Salvatore Bonaccorso <car...@debian.org> wrote:
> 
> Source: bind9
> Version: 1:9.18.16-1
> Severity: grave
> Tags: security upstream
> X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> <t...@security.debian.org>
> Control: found -1 1:9.18.16-1~deb12u1
> 
> Hi,
> 
> The following vulnerability was published for bind9.
> 
> CVE-2023-4236[0]:
> | A flaw in the networking code handling DNS-over-TLS queries may
> | cause `named` to terminate unexpectedly due to an assertion failure.
> | This happens when internal data structures are incorrectly reused
> | under significant DNS-over-TLS query load. This issue affects BIND 9
> | versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2023-4236
>    https://www.cve.org/CVERecord?id=CVE-2023-4236
> [1] https://kb.isc.org/docs/cve-2023-4236
> 
> Regards,
> Salvtore
> 

Reply via email to