Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <eb9b5bdc-aee2-8295-4711-276759fbeae0@isc.org>
Date: Wed, 17 Feb 2021 11:25:57 -0900
From: Michael McNally <mcnally@....org>
To: oss-security@...ts.openwall.com
Cc: "security-officer@....org" <security-officer@....org>
Subject: One BIND vulnerability (CVE-2020-8625) has been publicly disclosed

On February 17, 2021, Internet Systems Consortium has disclosed a
vulnerability in our BIND 9 software about which we previously
provided advance notice.

    CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
    negotiation can be targeted by a buffer overflow attack
    https://kb.isc.org/docs/cve-2020-8625

With the public announcement of this vulnerability, the embargo
period is ended and any updated software packages that have been
prepared may be released.

ISC's own releases containing fixes are:

    -  BIND 9.11.28
    -  BIND 9.16.12
    -  BIND 9.17.10

each of which can be downloaded via the ISC downloads page,
https://www.isc.org/downloads

For package maintainers who want *only* the fixes for the
CVE vulnerabilities, patch diffs are available for each branch
in the "patches" subdirectory of the branch's February 2021
maintenance release, e.g.:

   9.11 branch:  https://downloads.isc.org/isc/bind9/9.11.28/patches
   9.16 branch:  https://downloads.isc.org/isc/bind9/9.16.12/patches
   9.17 branch:  no patch necessary for versions >= 9.17.2

Sincerely,

Michael McNally
ISC Security Officer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.