DSA-4752-1 bind9 -- bind9ID: oval:org.secpod.oval:def:604996 | Date: (C)2020-08-31 (M)2024-01-16 |
Class: PATCH | Family: unix |
Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2020-8619 It was discovered that an asterisk character in an empty non- terminal can cause an assertion failure, resulting in denial of service. CVE-2020-8622 Dave Feldman, Jeff Warren, and Joel Cunningham reported that a truncated TSIG response can lead to an assertion failure, resulting in denial of service. CVE-2020-8623 Lyu Chiy reported that a flaw in the native PKCS#11 code can lead to a remotely triggerable assertion failure, resulting in denial of service. CVE-2020-8624 Joop Boonen reported that update-policy rules of type quot;subdomainquot; are enforced incorrectly, allowing updates to all parts of the zone along with the intended subdomain.
Product: |
libdns-export1104 |
libisccc161 |
libbind-export-dev |
libisccfg163 |
libirs-export161 |
libdns1104 |
dnsutils |
libbind-dev |
libisc-export1100 |
libbind9-161 |
libirs161 |
libisccfg-export163 |
libisccc-export161 |
libisc1100 |
liblwres161 |
bind9 |