Operating System:

[Debian]

Published:

22 February 2021

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0658
                           bind9 security update
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bind9
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-8625  

Reference:         ESB-2021.0612
                   ESB-2021.0611
                   ESB-2021.0610

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2568

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2568-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
February 19, 2021                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : bind9
Version        : 1:9.10.3.dfsg.P4-12.3+deb9u8
CVE ID         : CVE-2020-8625
Debian Bug     : #983004

It was discovered that there was a buffer overflow attack in the
bind9 DNS server caused by an issue in the GSSAPI ("Generic Security
Services") security policy negotiation.

For Debian 9 "Stretch", this problem has been fixed in version
1:9.10.3.dfsg.P4-12.3+deb9u8.

We recommend that you upgrade your bind9 packages.

For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=REBu
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Gu3L
-----END PGP SIGNATURE-----