aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2020-06-07 17:01:58 +0200
committerThorsten Alteholz <debian@alteholz.de>2020-06-07 17:01:58 +0200
commitf02672c2388720133385de3ccd9708ebc48ec10c (patch)
tree3690eb32c84875e4e20fccc8d3ac43bcbafc0338
parent65b66e99afbb373e648aa0d451e602f4ae60b8f1 (diff)
DLA 2227
-rw-r--r--english/lts/security/2020/dla-2227.data10
-rw-r--r--english/lts/security/2020/dla-2227.wml38
2 files changed, 48 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2227.data b/english/lts/security/2020/dla-2227.data
new file mode 100644
index 00000000000..172c0b57e2d
--- /dev/null
+++ b/english/lts/security/2020/dla-2227.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-2227-1 bind9</define-tag>
+<define-tag report_date>2020-5-30</define-tag>
+<define-tag secrefs>CVE-2020-8616 CVE-2020-8617</define-tag>
+<define-tag packages>bind9</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2020/dla-2227.wml b/english/lts/security/2020/dla-2227.wml
new file mode 100644
index 00000000000..4b8812675da
--- /dev/null
+++ b/english/lts/security/2020/dla-2227.wml
@@ -0,0 +1,38 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+
+<p>Several vulnerabilities were discovered in BIND, a DNS server
+implementation.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8616">CVE-2020-8616</a>
+
+ <p>It was discovered that BIND does not sufficiently limit the number
+ of fetches performed when processing referrals. An attacker can take
+ advantage of this flaw to cause a denial of service (performance
+ degradation) or use the recursing server in a reflection attack with
+ a high amplification factor.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-8617">CVE-2020-8617</a>
+
+ <p>It was discovered that a logic error in the code which checks TSIG
+ validity can be used to trigger an assertion failure, resulting in
+ denial of service.</p>
+
+
+<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
+1:9.9.5.dfsg-9+deb8u19.</p>
+
+<p>We recommend that you upgrade your bind9 packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
+
+</ul>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2020/dla-2227.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy