|
Message-ID: <eb9b5bdc-aee2-8295-4711-276759fbeae0@isc.org> Date: Wed, 17 Feb 2021 11:25:57 -0900 From: Michael McNally <mcnally@....org> To: oss-security@...ts.openwall.com Cc: "security-officer@....org" <security-officer@....org> Subject: One BIND vulnerability (CVE-2020-8625) has been publicly disclosed On February 17, 2021, Internet Systems Consortium has disclosed a vulnerability in our BIND 9 software about which we previously provided advance notice. CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack https://kb.isc.org/docs/cve-2020-8625 With the public announcement of this vulnerability, the embargo period is ended and any updated software packages that have been prepared may be released. ISC's own releases containing fixes are: - BIND 9.11.28 - BIND 9.16.12 - BIND 9.17.10 each of which can be downloaded via the ISC downloads page, https://www.isc.org/downloads For package maintainers who want *only* the fixes for the CVE vulnerabilities, patch diffs are available for each branch in the "patches" subdirectory of the branch's February 2021 maintenance release, e.g.: 9.11 branch: https://downloads.isc.org/isc/bind9/9.11.28/patches 9.16 branch: https://downloads.isc.org/isc/bind9/9.16.12/patches 9.17 branch: no patch necessary for versions >= 9.17.2 Sincerely, Michael McNally ISC Security Officer
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.