Bug 27164 - bind new security issues CVE-2020-862[2-4]
Summary: bind new security issues CVE-2020-862[2-4]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2020-08-21 19:21 CEST by David Walser
Modified: 2021-01-17 17:08 CET (History)
4 users (show)

See Also:
Source RPM: bind-9.11.6-1.1.mga7.src.rpm
CVE: CVE-2020-862[2-4]
Status comment:


Attachments

Description David Walser 2020-08-21 19:21:53 CEST
ISC has issued advisories on August 20:
https://kb.isc.org/docs/cve-2020-8622
https://kb.isc.org/docs/cve-2020-8623
https://kb.isc.org/docs/cve-2020-8624

The issues are fixed upstream in 9.11.22, and patches are available here:
https://downloads.isc.org/isc/bind9/9.11.22/patches

Mageia 7 is also affected.
David Walser 2020-08-21 19:22:04 CEST

Whiteboard: (none) => MGA7TOO

Comment 1 David Walser 2020-08-22 18:12:08 CEST
Fixed in Cauldron in bind-9.11.22-1.mga8 by Guillaume.

Whiteboard: MGA7TOO => (none)
Version: Cauldron => 7

Comment 2 David Walser 2020-08-23 17:22:12 CEST
Ubuntu has issued an advisory for this on August 21:
https://ubuntu.com/security/notices/USN-4468-1
Comment 3 David Walser 2020-08-27 23:09:24 CEST
Fedora has issued an advisory for this on August 26:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
Comment 4 David Walser 2020-11-10 16:12:01 CET
RedHat has issued an advisory for this today (November 10):
https://access.redhat.com/errata/RHSA-2020:5011
David Walser 2020-12-28 18:42:09 CET

Status comment: (none) => Patches available from upstream

Comment 5 Guillaume Rousse 2020-12-29 17:41:41 CET
I just submitted bind-9.11.6-1.2.mga7, fixing the 3 issues, in updates_testing for mageia 7.
Comment 6 David Walser 2020-12-29 17:54:15 CET
CVE-2020-8623 apparently doesn't affect us because we don't have the compile-time option enabled.

Advisory:
========================

Updated bind packages fix security vulnerabilities:

A flaw was found in bind. An assertion failure can occur when trying to verify
a truncated response to a TSIG-signed request. The highest threat from this
vulnerability is to system availability (CVE-2020-8622).

A flaw was found in bind. Updates to  "Update-policy" rules of type "subdomain"
are treated as if they were of type "zonesub" which allows updates to all parts
of the zone along with the intended subdomain. The highest threat from this
vulnerability is to data integrity (CVE-2020-8624).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/
========================

Updated packages in core/updates_testing:
========================
bind-9.11.6-1.2.mga7
bind-sdb-9.11.6-1.2.mga7
bind-utils-9.11.6-1.2.mga7
bind-dnssec-utils-9.11.6-1.2.mga7
libdns1105-9.11.6-1.2.mga7
libirs161-9.11.6-1.2.mga7
libisc1100-9.11.6-1.2.mga7
libbind9_161-9.11.6-1.2.mga7
liblwres161-9.11.6-1.2.mga7
libisccc161-9.11.6-1.2.mga7
libisccfg163-9.11.6-1.2.mga7
bind-devel-9.11.6-1.2.mga7
bind-chroot-9.11.6-1.2.mga7
bind-sdb-chroot-9.11.6-1.2.mga7
python3-bind-9.11.6-1.2.mga7

from bind-9.11.6-1.2.mga7.src.rpm

Assignee: guillomovitch => qa-bugs
Status comment: Patches available from upstream => (none)
CC: (none) => guillomovitch

Comment 7 Dave Hodgins 2021-01-13 22:49:45 CET
Update installs cleanly and continues to work.
Validating the update.

CC: (none) => davidwhodgins, sysadmin-bugs
Whiteboard: (none) => MGA7-64-OK
Keywords: (none) => validated_update

Comment 8 Aurelien Oudelet 2021-01-14 15:03:39 CET
Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?

Keywords: (none) => advisory
Source RPM: bind-9.11.21-1.mga8.src.rpm => bind-9.11.6-1.1.mga7.src.rpm
CC: (none) => ouaurelien
CVE: (none) => CVE-2020-862[2-4]

Aurelien Oudelet 2021-01-14 15:04:25 CET

Keywords: validated_update => (none)

Aurelien Oudelet 2021-01-14 15:05:17 CET

Status comment: (none) => Advisory written waiting for reply on comment 8

David Walser 2021-01-14 16:16:21 CET

Keywords: (none) => validated_update
Status comment: Advisory written waiting for reply on comment 8 => (none)

Comment 9 David Walser 2021-01-14 16:18:36 CET
(In reply to Aurelien Oudelet from comment #8)
> Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?

Already addressed in Comment 6.
Comment 10 Aurelien Oudelet 2021-01-14 16:26:04 CET
(In reply to David Walser from comment #9)
> (In reply to Aurelien Oudelet from comment #8)
> > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?
> 
> Already addressed in Comment 6.

Night work + tired. I really should read all.
Will push this evening as I am away from main computer.
Comment 11 Aurelien Oudelet 2021-01-17 15:01:49 CET
Advisory pushed to SVN.
Comment 12 Mageia Robot 2021-01-17 17:08:30 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0036.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.