[
Date Prev
][
Date Next
] [
Thread Prev
][
Thread Next
] [
Date Index
] [
Thread Index
]
Broken bind9 security update
To
: <
debian-lts@lists.debian.org
>
Subject
: Broken bind9 security update
From
: Christopher Huhn <
c.huhn@gsi.de
>
Date
: Sat, 19 Mar 2022 10:55:51 +0100
Message-id
: <
[🔎]
8eebfa6a-8c7c-2141-4d47-63b6316b2d12@gsi.de
>
In-reply-to
: <233d0fffcf3b9fa30fac2a721c2081925d8305db.camel@debian.org>
References
: <233d0fffcf3b9fa30fac2a721c2081925d8305db.camel@debian.org>
Hi y'all
It looks like the bind9 security update for Stretch is severely broken,
cf.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007945
We had to emergency downgrade to get our DNS servers working again. Best Christopher
Reply to:
debian-lts@lists.debian.org
Christopher Huhn (on-list)
Christopher Huhn (off-list)
Follow-Ups
:
Re: Broken bind9 security update
From:
Pascal Hambourg <pascal@plouf.fr.eu.org>
Re: Broken bind9 security update
From:
Markus Koschany <apo@debian.org>
Prev by Date:
(E)LTS report for February
Next by Date:
Re: Broken bind9 security update
Previous by thread:
(E)LTS report for February
Next by thread:
Re: Broken bind9 security update
Index(es):
Date
Thread