Debian 10225 Published by

A bind9 security update has been released for Debian GNULinux 8 LTS to address two vulnerabilities in BIND.



DLA 2227-1: bind9 security update



Package : bind9
Version : 1:9.9.5.dfsg-9+deb8u19
CVE ID : CVE-2020-8616 CVE-2020-8617

Several vulnerabilities were discovered in BIND, a DNS server
implementation.

CVE-2020-8616

It was discovered that BIND does not sufficiently limit the number
of fetches performed when processing referrals. An attacker can take
advantage of this flaw to cause a denial of service (performance
degradation) or use the recursing server in a reflection attack with
a high amplification factor.

CVE-2020-8617

It was discovered that a logic error in the code which checks TSIG
validity can be used to trigger an assertion failure, resulting in
denial of service.

For Debian 8 "Jessie", these problems have been fixed in version
1:9.9.5.dfsg-9+deb8u19.

We recommend that you upgrade your bind9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS