Описание
Security update for bind
This update for bind fixes the following issues:
- CVE-2020-8622: A truncated TSIG response can lead to an assertion failure (bsc#1175443).
Список пакетов
HPE Helion OpenStack 8
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE Linux Enterprise Server 12 SP2-BCL
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE Linux Enterprise Server 12 SP3-BCL
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE Linux Enterprise Server 12 SP3-LTSS
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE OpenStack Cloud 8
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
SUSE OpenStack Cloud Crowbar 8
bind-9.9.9P1-63.28.1
bind-chrootenv-9.9.9P1-63.28.1
bind-doc-9.9.9P1-63.28.1
bind-libs-9.9.9P1-63.28.1
bind-libs-32bit-9.9.9P1-63.28.1
bind-utils-9.9.9P1-63.28.1
Ссылки
- Link for SUSE-SU-2021:2876-1
- E-Mail link for SUSE-SU-2021:2876-1
- SUSE Security Ratings
- SUSE Bug 1175443
- SUSE Bug 1188888
- SUSE CVE CVE-2020-8622 page
Описание
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Затронутые продукты
HPE Helion OpenStack 8:bind-9.9.9P1-63.28.1
HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.28.1
HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.28.1
HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.28.1
Ссылки
- CVE-2020-8622
- SUSE Bug 1175443
- SUSE Bug 1188888
- SUSE Bug 1191120