[Bug 277035] dns/bind918: Security vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 13 Feb 2024 18:41:44 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=277035 Bug ID: 277035 Summary: dns/bind918: Security vulnerabilities Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: mat@FreeBSD.org Reporter: cy@FreeBSD.org CC: portmgr@FreeBSD.org Flags: maintainer-feedback?(mat@FreeBSD.org) Assignee: mat@FreeBSD.org Flags: maintainer-feedback?, merge-quarterly? Created attachment 248445 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=248445&action=edit Update dns/bind918 to 9.18.24 Cybersecurity and Infrastructure Security Agency (CISA) You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated and is now available. ISC Releases Security Advisories for BIND 9 [ https://www.cisa.gov/news-events/alerts/2024/02/13/isc-releases-security-advisories-bind-9 ] 02/13/2024 1:10 PM EST The Internet Systems Consortium (ISC) released security advisories to address vulnerabilities affecting multiple versions of ISCs Berkeley Internet Name Domain (BIND) 9. A cyber threat actor could exploit one of these vulnerabilities to cause a denial-of-service condition. CISA encourages users and administrators to review the following advisories and apply the necessary updates: * CVE-2023-50868 [ https://kb.isc.org/docs/cve-2023-50868 ] * CVE-2023-50387 [ https://kb.isc.org/docs/cve-2023-50387 ] * CVE-2023-6516 [ https://kb.isc.org/docs/cve-2023-6516 ] * CVE-2023-5680 [ https://kb.isc.org/docs/cve-2023-5680 ] * CVE-2023-5679 [ https://kb.isc.org/docs/cve-2023-5679 ] * CVE-2023-5517 [ https://kb.isc.org/docs/cve-2023-5517 ] * CVE-2023-4408 [ https://kb.isc.org/docs/cve-2023-4408 ] This product is provided subject to this Notification [ https://www.cisa.gov/notification ] and this Privacy & Use [ https://www.cisa.gov/privacy-policy ] policy. body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: #333333; } Having trouble viewing this message? View it as a webpage [ https://content.govdelivery.com/accounts/USDHSCISA/bulletins/38a5904 ]. [ https://content.govdelivery.com/accounts/USDHS/bulletins/292141e ] You are subscribed to updates from the Cybersecurity and Infrastructure Security Agency [ https://www.cisa.gov ] (CISA) Manage Subscriptions [ https://public.govdelivery.com/accounts/USDHSCISA/subscriber/edit?preferences=true#tab1 ] | Privacy Policy [ https://www.cisa.gov/privacy-policy ] | Help [ https://subscriberhelp.granicus.com/s/article/Subscriber-Help-Center ] [ https://insights.govdelivery.com/Communications/Subscriber_Help_Center ] Connect with CISA: Facebook [ https://www.facebook.com/CISA ] | Twitter [ https://twitter.com/CISAgov ] | Instagram [ https://Instagram.com/cisagov ] | LinkedIn [ https://www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency ] | YouTube [ https://www.youtube.com/channel/UCxyq9roe-npgzrVwbpoAy0A ] -- You are receiving this mail because: You are the assignee for the bug.