MGASA-2020-0259

Source
https://advisories.mageia.org/MGASA-2020-0259.html
Import Source
https://advisories.mageia.org/MGASA-2020-0259.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0259
Related
Published
2020-06-15T07:54:40Z
Modified
2020-06-15T07:08:06Z
Summary
Updated bind packages fix security vulnerability
Details

Updated bind packages fix security vulnerabilities:

It was discovered that Bind incorrectly handled certain TCP-pipelined queries. A remote attacker could possibly use this issue to cause Bind to consume resources, resulting in a denial of service (CVE-2019-6477).

Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind incorrectly limited certain fetches. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service, or possibly use Bind to perform a reflection attack (CVE-2020-8616).

Tobias Klein discovered that Bind incorrectly handled checking TSIG validity. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly perform other attacks (CVE-2020-8617).

References
Credits

Affected packages

Mageia:7 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.11.6-1.1.mga7

Ecosystem specific

{
    "section": "core"
}