ISC has issued advisories on August 20:
The issues are fixed upstream in 9.11.22, and patches are available here:
Mageia 7 is also affected.
Fixed in Cauldron in bind-9.11.22-1.mga8 by Guillaume.
Ubuntu has issued an advisory for this on August 21:
Fedora has issued an advisory for this on August 26:
RedHat has issued an advisory for this today (November 10):
Patches available from upstream
I just submitted bind-9.11.6-1.2.mga7, fixing the 3 issues, in updates_testing for mageia 7.
CVE-2020-8623 apparently doesn't affect us because we don't have the compile-time option enabled.
Updated bind packages fix security vulnerabilities:
A flaw was found in bind. An assertion failure can occur when trying to verify
a truncated response to a TSIG-signed request. The highest threat from this
vulnerability is to system availability (CVE-2020-8622).
A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain"
are treated as if they were of type "zonesub" which allows updates to all parts
of the zone along with the intended subdomain. The highest threat from this
vulnerability is to data integrity (CVE-2020-8624).
Updated packages in core/updates_testing:
Patches available from upstream =>
Update installs cleanly and continues to work.
Validating the update.
Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?
Advisory written waiting for reply on comment 8
Advisory written waiting for reply on comment 8 =>
(In reply to Aurelien Oudelet from comment #8)
> Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?
Already addressed in Comment 6.
(In reply to David Walser from comment #9)
> (In reply to Aurelien Oudelet from comment #8)
> > Are we affected by: https://kb.isc.org/docs/cve-2020-8623 ?
> Already addressed in Comment 6.
Night work + tired. I really should read all.
Will push this evening as I am away from main computer.
Advisory pushed to SVN.
An update for this issue has been pushed to the Mageia Updates repository.