|
Message-ID: <4a79bee5-ad58-83bf-8279-26c3f7224ee0@isc.org>
Date: Wed, 20 Nov 2019 19:52:11 +0000
From: ISC Security Officer <security-officer@....org>
To: oss-security@...ts.openwall.com
Subject: BIND9 CVE-2019-6477
Today (2019-11-20) ISC announced a vulnerability in our BIND 9 software.
CVE-2019-6477, TCP-pipelined queries can bypass tcp-clients limit
This issue affects BIND 9.11, BIND 9.14, and BIND 9.15.
Our full CVE text can be found at:
https://kb.isc.org/docs/cve-2019-6477
New releases of BIND, including security fixes for this vulnerability,
are available at:
https://www.isc.org/download
Release notes for the new versions can be obtained using the following
links:
https://downloads.isc.org/isc/bind9/9.15.6/RELEASE-NOTES-bind-9.15.6.html
https://downloads.isc.org/isc/bind9/9.14.8/RELEASE-NOTES-bind-9.14.8.html
https://downloads.isc.org/isc/bind9/9.11.13/RELEASE-NOTES-bind-9.11.13.html
--
Cathy Almond
ISC Support
Acting Security Officer
Download attachment "signature.asc" of type "application/pgp-signature" (530 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.