exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5441-1

Debian Security Advisory 5441-1
Posted Jun 30, 2023
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5441-1 - Two vulnerabilities were found in maradns, an open source domain name system (DNS) implementation, that may lead to denial of service and unintended domain name resolution.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2022-30256, CVE-2023-31137
SHA-256 | 42371e88c20f5ab5164b61bc77060d6493521b1c8de05e5c0712deb0f97d3b4c

Debian Security Advisory 5441-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5441-1 security@debian.org
https://www.debian.org/security/ Aron Xu
June 29, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : maradns
CVE ID : CVE-2022-30256 CVE-2023-31137
Debian Bug : 1033252 1035936

Brief introduction

Two vulnerbilities were found in maradns, an open source domain name
system (DNS) implementation, that may lead to denial of service and
unintended domain name resolution.

For the oldstable distribution (bullseye), these problems have been fixed
in version 2.0.13-1.4+deb11u1.

We recommend that you upgrade your maradns packages.

For the detailed security status of maradns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/maradns

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmSc6j4ACgkQO1LKKgqv
2VSQLgf/Tn5pYOeHQDp4pK8nzpQ4FgIZkbxmsjvuzT3SEX637sDWz2hAfbeIWxjw
w0KbZnkdQIkPOWh6s5jZ3W4hvU7S+nhPjGiU88PXvGAyYItvU2QfaEXWzy4wwLBl
Pfuh8CiVJxREyvEk9sjZCGr/VqwQyY0ttYqbkpmx0cscm7MpdWBa7WsFFh19bNXU
D3tWs0RPH0V5HNOwuBiay0uFh0V2o4PAssR8qaYeDfW2QQT5i1uf2wyW+Bq7IYUs
xvMUKo3iRPQ9pX/nnpj0+ZyG/Mtn6tI8F0gMt/LS6LiAyQz/D7EdBguUJ56LZ/on
iquCYAyAfnDwNRat66CEEpZpMXN0Xw==
=eb0N
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close