#16558 closed enhancement (fixed)
bind9-9.18.3 bind
Reported by: | Bruce Dubbs | Owned by: | Bruce Dubbs |
---|---|---|---|
Priority: | elevated | Milestone: | 11.2 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New point version.
Change History (4)
comment:1 by , 3 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 3 years ago
comment:3 by , 3 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at commits:
4d14be0462 Update to libwww-perl-6.66. f9478ee04a Update to LVM2.2.03.16. 673b197e2b Update to gtk+3-3.24.34. 6edb9af171 Update to bind-9.18.3.
comment:4 by , 3 years ago
Priority: | normal → elevated |
---|
Retroactively mark as Elevated due to CVE-2022-1183
An oss-security post was also put out:
On May 18 2022, we (Internet Systems Consortium) have disclosed a vulnerability affecting our BIND software:
CVE-2022-1183: Destroying a TLS session early triggers assertion failure
https://kb.isc.org/v1/docs/cve-2022-1183
New versions of BIND are available from https://www.isc.org/downloads
Operators and package maintainers who prefer to apply patches selectively can find individual vulnerability-specific patches in the "patches" subdirectory of the release directories for our affected stable release branch (9.18):
9.18: https://downloads.isc.org/isc/bind9/9.18.3/patches/
With the public announcement of this vulnerability, the embargo period is ended and any updated software packages that have been prepared may be released.
---
The security advisory was already put out, just dropping the info into the ticket for future reference
9.18.3 released