Debian Linux Security Advisory 5441-1 - Two vulnerabilities were found in maradns, an open source domain name system (DNS) implementation, that may lead to denial of service and unintended domain name resolution.
42371e88c20f5ab5164b61bc77060d6493521b1c8de05e5c0712deb0f97d3b4c
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5441-1 security@debian.org
https://www.debian.org/security/ Aron Xu
June 29, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : maradns
CVE ID : CVE-2022-30256 CVE-2023-31137
Debian Bug : 1033252 1035936
Brief introduction
Two vulnerbilities were found in maradns, an open source domain name
system (DNS) implementation, that may lead to denial of service and
unintended domain name resolution.
For the oldstable distribution (bullseye), these problems have been fixed
in version 2.0.13-1.4+deb11u1.
We recommend that you upgrade your maradns packages.
For the detailed security status of maradns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/maradns
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmSc6j4ACgkQO1LKKgqv
2VSQLgf/Tn5pYOeHQDp4pK8nzpQ4FgIZkbxmsjvuzT3SEX637sDWz2hAfbeIWxjw
w0KbZnkdQIkPOWh6s5jZ3W4hvU7S+nhPjGiU88PXvGAyYItvU2QfaEXWzy4wwLBl
Pfuh8CiVJxREyvEk9sjZCGr/VqwQyY0ttYqbkpmx0cscm7MpdWBa7WsFFh19bNXU
D3tWs0RPH0V5HNOwuBiay0uFh0V2o4PAssR8qaYeDfW2QQT5i1uf2wyW+Bq7IYUs
xvMUKo3iRPQ9pX/nnpj0+ZyG/Mtn6tI8F0gMt/LS6LiAyQz/D7EdBguUJ56LZ/on
iquCYAyAfnDwNRat66CEEpZpMXN0Xw==
=eb0N
-----END PGP SIGNATURE-----