BIND 9.10.3-P2 is now available [corrected]
mcnally at isc.org
Tue Dec 15 21:49:16 UTC 2015
[Please excuse the errors in the first version of this message.
these are the correct release notes for BIND 9.10.3-P2]
This document summarizes changes since BIND 9.10.3:
BIND 9.10.3-P2 addresses the security issues described in CVE-2015-3193
(OpenSSL), CVE-2015-8000 and CVE-2015-8461.
BIND 9.10.3-P1 was incomplete and was withdrawn prior to publication.
The latest versions of BIND 9 software can always be found at
http://www.isc.org/downloads/. There you will find additional
information about each release, source code, and pre-compiled versions
for Microsoft Windows operating systems.
* Named is potentially vulnerable to the OpenSSL vulnerabilty
described in CVE-2015-3193.
* Incorrect reference counting could result in an INSIST failure if a
socket error occurred while performing a lookup. This flaw is
disclosed in CVE-2015-8461. [RT#40945]
* Insufficient testing when parsing a message allowed records with an
incorrect class to be be accepted, triggering a REQUIRE failure
when those records were subsequently cached. This flaw is disclosed
in CVE-2015-8000. [RT #40987]
* Updated the compiled in addresses for H.ROOT-SERVERS.NET.
End of Life
The end of life for BIND 9.10 is yet to be determined but will not be
before BIND 9.12.0 has been released for 6 months.
Thank you to everyone who assisted us in making this release possible.
If you would like to contribute to ISC to assist us in continuing to
make quality open source software, please visit our donations page at
More information about the bind-announce