#13550: bind bind9 9.16.3
-------------------------+-----------------------
 Reporter:  renodr       |      Owner:  blfs-book
     Type:  enhancement  |     Status:  new
 Priority:  high         |  Milestone:  9.2
Component:  BOOK         |    Version:  SVN
 Severity:  normal       |   Keywords:
-------------------------+-----------------------
 New point version

 Contains security fixes:

 {{{
 On May 19, 2020, Internet Systems Consortium have disclosed two
 vulnerabilities in our BIND 9 software:

    CVE-2020-8616: BIND does not sufficiently limit the number
    of fetches performed when processing referrals
    https://kb.isc.org/docs/cve-2020-8616

    CVE-2020-8617: A logic error in code which checks TSIG
    validity can be used to trigger an assertion failure in tsig.c
    https://kb.isc.org/docs/cve-2020-8617

 With the public announcement of these vulnerabilities, the embargo
 period is ended and any updated software packages that have been
 prepared may be released.

 ISC's own releases containing fixes are:

    -  BIND 9.11.19
    -  BIND 9.14.12
    -  BIND 9.16.3

 each of which can be downloaded via the ISC downloads page,
 https://www.isc.org/downloads

 For package maintainers who want *only* the fixes for the
 CVE vulnerabilities, patch diffs are available for each branch
 in the "patches" subdirectory of the branch's May 2020
 maintenance release, e.g.:

   9.11 branch:  https://downloads.isc.org/isc/bind9/9.11.19/patches
   9.14 branch:  https://downloads.isc.org/isc/bind9/9.14.12/patches
   9.16 branch:  https://downloads.isc.org/isc/bind9/9.16.3/patches

 Sincerely,

 Michael McNally
 ISC Security Officer
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/13550>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to