Debian Security Advisory
DLA-2227-1 bind9 -- LTS security update
- Date Reported:
- 30 May 2020
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-8616, CVE-2020-8617.
- More information:
Several vulnerabilities were discovered in BIND, a DNS server implementation.
It was discovered that BIND does not sufficiently limit the number of fetches performed when processing referrals. An attacker can take advantage of this flaw to cause a denial of service (performance degradation) or use the recursing server in a reflection attack with a high amplification factor.
It was discovered that a logic error in the code which checks TSIG validity can be used to trigger an assertion failure, resulting in denial of service.
For Debian 8
Jessie, these problems have been fixed in version 1:9.9.5.dfsg-9+deb8u19.
We recommend that you upgrade your bind9 packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS