ALT-BU-2020-4012-1
Branch c8.1 update bulletin.
Closed vulnerabilities
BDU:2021-01693
Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01725
Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01726
Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано
Modified: 2024-11-21
CVE-2020-8622
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8622
- https://kb.isc.org/docs/cve-2020-8622
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- USN-4468-2
- USN-4468-2
- DSA-4752
- DSA-4752
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8623
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8623
- https://kb.isc.org/docs/cve-2020-8623
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8624
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8624
- https://kb.isc.org/docs/cve-2020-8624
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19