Mageia 2020-0259: bind security update
Summary
Updated bind packages fix security vulnerabilities:
It was discovered that Bind incorrectly handled certain TCP-pipelined
queries.
A remote attacker could possibly use this issue to cause Bind to consume
resources, resulting in a denial of service (CVE-2019-6477).
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind
incorrectly limited certain fetches. A remote attacker could possibly
use this issue to cause Bind to consume resources, leading to a denial
of service, or possibly use Bind to perform a reflection attack
(CVE-2020-8616).
Tobias Klein discovered that Bind incorrectly handled checking TSIG
validity.
A remote attacker could use this issue to cause Bind to crash, resulting
in a denial of service, or possibly perform other attacks
(CVE-2020-8617).
References
- https://bugs.mageia.org/show_bug.cgi?id=25724
- https://kb.isc.org/docs/cve-2019-6477
- https://kb.isc.org/docs/cve-2020-8616
- https://kb.isc.org/docs/cve-2020-8617
- https://ubuntu.com/security/notices/USN-4197-1
- https://ubuntu.com/security/notices/USN-4365-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
Resolution
MGASA-2020-0259 - Updated bind packages fix security vulnerability
SRPMS
- 7/core/bind-9.11.6-1.1.mga7