BIND 9.10.3-P4 Release Notes
| Author: ISC Support Reference Number: AA-01363 Views: 3027 Created: 2016-03-09 18:43 Last Updated: 2016-03-09 19:31
0 Rating/ Voters
This document summarizes changes since BIND 9.10.3:
BIND 9.10.3-P4 addresses the security issues described in
CVE-2016-1285, CVE-2016-1286 and CVE-2016-2088.
BIND 9.10.3-P3 addresses the security issues described in
CVE-2015-8704 and CVE-2015-8705. It also fixes a serious
regression in authoritative server selection that was
introduced in BIND 9.10.3.
BIND 9.10.3-P2 addresses the security issues described in
CVE-2015-3193 (OpenSSL), CVE-2015-8000 and CVE-2015-8461.
BIND 9.10.3-P1 was incomplete and was withdrawn prior to publication.
The latest versions of BIND 9 software can always be found at
There you will find additional information about each release,
source code, and pre-compiled versions for Microsoft Windows
Duplicate EDNS COOKIE options in a response could trigger
an assertion failure. This flaw is disclosed in CVE-2016-2088.
The resolver could abort with an assertion failure due to
improper DNAME handling when parsing fetch reply
messages. This flaw is disclosed in CVE-2016-1286. [RT #41753]
Malformed control messages can trigger assertions in named
and rndc. This flaw is disclosed in CVE-2016-1285. [RT
Certain errors that could be encountered when printing out
or logging an OPT record containing a CLIENT-SUBNET option
could be mishandled, resulting in an assertion failure.
This flaw is disclosed in CVE-2015-8705. [RT #41397]
Specific APL data could trigger an INSIST. This flaw
is disclosed in CVE-2015-8704. [RT #41396]
Named is potentially vulnerable to the OpenSSL vulnerability
described in CVE-2015-3193.
Incorrect reference counting could result in an INSIST
failure if a socket error occurred while performing a
lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted,
triggering a REQUIRE failure when those records
were subsequently cached. This flaw is disclosed
in CVE-2015-8000. [RT #40987]
Thank you to everyone who assisted us in making this release possible.
If you would like to contribute to ISC to assist us in continuing to
make quality open source software, please visit our donations page at
© 2001-2017 Internet Systems ConsortiumFor assistance with problems and questions for which you have not been able to find an answer in our Knowledge Base, we recommend searching our community mailing list archives and/or posting your question there (you will need to register there first for your posts to be accepted). The bind-users and the dhcp-users lists particularly have a long-standing and active membership.ISC relies on the financial support of the community to fund the development of its open source software products. If you would like to support future product evolution and maintenance as well having peace of mind knowing that our team of experts are poised to provide you with individual technical assistance whenever you call upon them, then please consider our Professional Subscription Support services - details can be found on our main website.