| Summary: | bind new security issues CVE-2020-862[2-4] | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, guillomovitch, ouaurelien, sysadmin-bugs |
| Version: | 7 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA7-64-OK | ||
| Source RPM: | bind-9.11.6-1.1.mga7.src.rpm | CVE: | CVE-2020-862[2-4] |
| Status comment: | |||
|
Description
David Walser
2020-08-21 19:21:53 CEST
David Walser
2020-08-21 19:22:04 CEST
Whiteboard:
(none) =>
MGA7TOO Fixed in Cauldron in bind-9.11.22-1.mga8 by Guillaume. Whiteboard:
MGA7TOO =>
(none) Ubuntu has issued an advisory for this on August 21: https://ubuntu.com/security/notices/USN-4468-1 Fedora has issued an advisory for this on August 26: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ RedHat has issued an advisory for this today (November 10): https://access.redhat.com/errata/RHSA-2020:5011
David Walser
2020-12-28 18:42:09 CET
Status comment:
(none) =>
Patches available from upstream I just submitted bind-9.11.6-1.2.mga7, fixing the 3 issues, in updates_testing for mageia 7. CVE-2020-8623 apparently doesn't affect us because we don't have the compile-time option enabled. Advisory: ======================== Updated bind packages fix security vulnerabilities: A flaw was found in bind. An assertion failure can occur when trying to verify a truncated response to a TSIG-signed request. The highest threat from this vulnerability is to system availability (CVE-2020-8622). A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain" are treated as if they were of type "zonesub" which allows updates to all parts of the zone along with the intended subdomain. The highest threat from this vulnerability is to data integrity (CVE-2020-8624). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ ======================== Updated packages in core/updates_testing: ======================== bind-9.11.6-1.2.mga7 bind-sdb-9.11.6-1.2.mga7 bind-utils-9.11.6-1.2.mga7 bind-dnssec-utils-9.11.6-1.2.mga7 libdns1105-9.11.6-1.2.mga7 libirs161-9.11.6-1.2.mga7 libisc1100-9.11.6-1.2.mga7 libbind9_161-9.11.6-1.2.mga7 liblwres161-9.11.6-1.2.mga7 libisccc161-9.11.6-1.2.mga7 libisccfg163-9.11.6-1.2.mga7 bind-devel-9.11.6-1.2.mga7 bind-chroot-9.11.6-1.2.mga7 bind-sdb-chroot-9.11.6-1.2.mga7 python3-bind-9.11.6-1.2.mga7 from bind-9.11.6-1.2.mga7.src.rpm Assignee:
guillomovitch =>
qa-bugs Update installs cleanly and continues to work. Validating the update. CC:
(none) =>
davidwhodgins, sysadmin-bugs Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ? Keywords:
(none) =>
advisory
Aurelien Oudelet
2021-01-14 15:04:25 CET
Keywords:
validated_update =>
(none)
Aurelien Oudelet
2021-01-14 15:05:17 CET
Status comment:
(none) =>
Advisory written waiting for reply on comment 8
David Walser
2021-01-14 16:16:21 CET
Keywords:
(none) =>
validated_update (In reply to Aurelien Oudelet from comment #8) > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ? Already addressed in Comment 6. (In reply to David Walser from comment #9) > (In reply to Aurelien Oudelet from comment #8) > > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ? > > Already addressed in Comment 6. Night work + tired. I really should read all. Will push this evening as I am away from main computer. Advisory pushed to SVN. An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0036.html Resolution:
(none) =>
FIXED |