ISC has issued advisories on August 20: https://kb.isc.org/docs/cve-2020-8622 https://kb.isc.org/docs/cve-2020-8623 https://kb.isc.org/docs/cve-2020-8624 The issues are fixed upstream in 9.11.22, and patches are available here: https://downloads.isc.org/isc/bind9/9.11.22/patches Mageia 7 is also affected.
Whiteboard: (none) => MGA7TOO
Fixed in Cauldron in bind-9.11.22-1.mga8 by Guillaume.
Whiteboard: MGA7TOO => (none)Version: Cauldron => 7
Ubuntu has issued an advisory for this on August 21: https://ubuntu.com/security/notices/USN-4468-1
Fedora has issued an advisory for this on August 26: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
RedHat has issued an advisory for this today (November 10): https://access.redhat.com/errata/RHSA-2020:5011
Status comment: (none) => Patches available from upstream
I just submitted bind-9.11.6-1.2.mga7, fixing the 3 issues, in updates_testing for mageia 7.
CVE-2020-8623 apparently doesn't affect us because we don't have the compile-time option enabled. Advisory: ======================== Updated bind packages fix security vulnerabilities: A flaw was found in bind. An assertion failure can occur when trying to verify a truncated response to a TSIG-signed request. The highest threat from this vulnerability is to system availability (CVE-2020-8622). A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain" are treated as if they were of type "zonesub" which allows updates to all parts of the zone along with the intended subdomain. The highest threat from this vulnerability is to data integrity (CVE-2020-8624). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ ======================== Updated packages in core/updates_testing: ======================== bind-9.11.6-1.2.mga7 bind-sdb-9.11.6-1.2.mga7 bind-utils-9.11.6-1.2.mga7 bind-dnssec-utils-9.11.6-1.2.mga7 libdns1105-9.11.6-1.2.mga7 libirs161-9.11.6-1.2.mga7 libisc1100-9.11.6-1.2.mga7 libbind9_161-9.11.6-1.2.mga7 liblwres161-9.11.6-1.2.mga7 libisccc161-9.11.6-1.2.mga7 libisccfg163-9.11.6-1.2.mga7 bind-devel-9.11.6-1.2.mga7 bind-chroot-9.11.6-1.2.mga7 bind-sdb-chroot-9.11.6-1.2.mga7 python3-bind-9.11.6-1.2.mga7 from bind-9.11.6-1.2.mga7.src.rpm
Assignee: guillomovitch => qa-bugsStatus comment: Patches available from upstream => (none)CC: (none) => guillomovitch
Update installs cleanly and continues to work. Validating the update.
CC: (none) => davidwhodgins, sysadmin-bugsWhiteboard: (none) => MGA7-64-OKKeywords: (none) => validated_update
Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?
Keywords: (none) => advisorySource RPM: bind-9.11.21-1.mga8.src.rpm => bind-9.11.6-1.1.mga7.src.rpmCC: (none) => ouaurelienCVE: (none) => CVE-2020-862[2-4]
Keywords: validated_update => (none)
Status comment: (none) => Advisory written waiting for reply on comment 8
Keywords: (none) => validated_updateStatus comment: Advisory written waiting for reply on comment 8 => (none)
(In reply to Aurelien Oudelet from comment #8) > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ? Already addressed in Comment 6.
(In reply to David Walser from comment #9) > (In reply to Aurelien Oudelet from comment #8) > > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ? > > Already addressed in Comment 6. Night work + tired. I really should read all. Will push this evening as I am away from main computer.
Advisory pushed to SVN.
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0036.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED