Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 29 Apr 2021 04:34:11 -0600 (MDT)
From: Ariadne Conill <>
cc: "" <>
Subject: Re: ISC discloses three BIND vulnerabilities
 (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)


On Wed, 28 Apr 2021, Michael McNally wrote:

> On April 28, 2021, we (Internet Systems Consortium) disclosed three
> vulnerabilities affecting our BIND 9 software:
>   CVE-2021-25214: A broken inbound incremental zone update (IXFR)
>   can cause named to terminate unexpectedly
>   CVE-2021-25215: An assertion check can fail while answering queries for
>   DNAME records that require the DNAME to be processed to resolve itself
>   CVE-2021-25216: A second vulnerability in BIND's GSSAPI security policy
>   negotiation can be targeted by a buffer overflow attack
> New versions of BIND are available from
> Operators and package maintainers who prefer to apply patches selectively can
> find individual vulnerability-specific patches in the "patches" subdirectory
> of the release directories for our two stable release branches (9.11 and 
> 9.16)

These directories only have patches for CVE-2021-25214 and CVE-2021-25215. 
A patch for CVE-2021-25216 appears to be missing.  In some supported 
branches of Alpine, we erroneously followed a development branch of BIND, 
so I am trying to determine if there is anything I need to backport to 
cover CVE-2021-25216.

Thanks in advance for any advice you can provide on this.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.