Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4a79bee5-ad58-83bf-8279-26c3f7224ee0@isc.org>
Date: Wed, 20 Nov 2019 19:52:11 +0000
From: ISC Security Officer <security-officer@....org>
To: oss-security@...ts.openwall.com
Subject: BIND9 CVE-2019-6477

Today (2019-11-20) ISC announced a vulnerability in our BIND 9 software.

   CVE-2019-6477, TCP-pipelined queries can bypass tcp-clients limit

This issue affects BIND 9.11, BIND 9.14, and BIND 9.15.

Our full CVE text can be found at:

    https://kb.isc.org/docs/cve-2019-6477

New releases of BIND, including security fixes for this vulnerability,
are available at:

    https://www.isc.org/download

Release notes for the new versions can be obtained using the following
links:


https://downloads.isc.org/isc/bind9/9.15.6/RELEASE-NOTES-bind-9.15.6.html

https://downloads.isc.org/isc/bind9/9.14.8/RELEASE-NOTES-bind-9.14.8.html

https://downloads.isc.org/isc/bind9/9.11.13/RELEASE-NOTES-bind-9.11.13.html

-- 
Cathy Almond
ISC Support
Acting Security Officer



Download attachment "signature.asc" of type "application/pgp-signature" (530 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.