ID

VAR-202008-1238


CVE

CVE-2020-8622


TITLE

Debian Security Advisory 4752-1

Trust: 0.1

sources: PACKETSTORM: 168899

DESCRIPTION

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit. runc is a CLI (command line interface) tool for building and running containers according to the OCI specification. BIND 9.0.0 to 9.11.21, 9.12.0 to 9.16.5, 9.17.0 to 9.17.3, 9.9.3-S1 to 9.11.21-S1 have security vulnerabilities, attackers can construct a special request to cause an assertion failure Causes the target service to end abnormally. For the stable distribution (buster), these problems have been fixed in version 1:9.11.5.P4+dfsg-5.1+deb10u2. We recommend that you upgrade your bind9 packages. For the detailed security status of bind9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/bind9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl9H9LBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Riow//eYx52gDQkiERYSEFJbSK34AzF5Ee3W8JYh1BG4PFagvR/y3hwddyFEkR pHlq/t78TPWi9oQ3j8uuQL0VLMA+8jyaNXA0h6BMs/3VKzGktFyINdKPBPIghT2w 2tugfgjK1MR0LZ27rcE86I1QoyFy+jHMmd03R0B0AQPWYkjp+2sp5nxskFVM9jXO 8emXIzT3IZns8WSS7xCZOqE6D40Vk/3hP5IXDXIbHHFUgl6jCEpPHJBHCgrtw9HZ Or/EQgy4y+QUZNqsPw93kxc7cwVWhauW/PX9VZ1HWnfMIWEZX9K8fmYPHlj4dJUa 1G45uTtYT7VaLvs+N7j1UulII+f1ZT9rrljasVKfbmALt+mp28/LzzcCCBMYohkK Ka30MmBu5yZnn36LNWGwaOO5D+cCHsc58awKu3C5wUG/QMBjT+dYlhkbUbllpZVj vMMXjnrefdkCLy7LEDAul1NLgxWcSWzcQ0SyNEfu9IajtA94unFMwNzFmQb7ykql WMkHTg+7mSdPCxOI+0g9+w+pKZFdBGZxXu76cV8FB1BmRitsM8XYrtBGO9uWvkI9 hIm7pHhyJB0E008qo+cKutpnvruLZLBUCutUuNHZAirq+zaHjoVDSxiqPWEJ9jdR Sx85bc7+6f1daR04r5ay/mCuWPTQYrM1VyBsFnAvGxWoznHnmbk= =kUyE -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: bind security update Advisory ID: RHSA-2020:4183-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:4183 Issue date: 2020-10-07 CVE Names: CVE-2020-8622 ==================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: truncated TSIG response can lead to an assertion failure (CVE-2020-8622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1869473 - CVE-2020-8622 bind: truncated TSIG response can lead to an assertion failure 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.68.rc1.el6_10.8.src.rpm i386: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.i686.rpm x86_64: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.i686.rpm x86_64: bind-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.68.rc1.el6_10.8.src.rpm x86_64: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.68.rc1.el6_10.8.src.rpm i386: bind-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.i686.rpm ppc64: bind-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.ppc.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.ppc.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm s390x: bind-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.s390.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.s390.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.s390x.rpm x86_64: bind-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.i686.rpm ppc64: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.ppc.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.ppc.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.s390.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.s390.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.s390x.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.68.rc1.el6_10.8.src.rpm i386: bind-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.i686.rpm x86_64: bind-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-chroot-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-libs-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-utils-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.i686.rpm x86_64: bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-debuginfo-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.i686.rpm bind-devel-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm bind-sdb-9.8.2-0.68.rc1.el6_10.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-8622 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBX34ip9zjgjWX9erEAQggtxAAggiseLLM3omkfl5t8K2CgloI9VI+hsgl 8S2aF4eU4Fhp7mZT+bXuFhN7QxQNGCyqc6slFZrJUlBnQKvUOzDnu+zPF1C4t7N2 lhsIlwBBB1aBug89tOfmvAJ5o0mwtJgGuB2xfFoCm5QdlrSwgbt8ygQL9yfZDHGY 54wZfpQeSfN5celNJgZQabXvkLKZ2DZsn/CGjZ+UwmZeF2gPtSpdKihnMbO0EkaK cxSkwBNR4CLhc4DJ77HWn0jRHTfO4dhfGOTIM6DhvwErcWj7vN3mSGtKtflV47D4 wUUuwQ9RpmVLNpLBaAge6H9/lTb8P8SSkl07y9XLvPUu0iJhtkgZY9+s10JBSpNF 4McC7h6iDC38QNbGidB+YqIX+EDxpHQq8O7tWrOdnaaZF2/UU7NpfoF7cZXJTDqo 0r9LNvKV7WFGn66rsIEvyhke42iBKF3gZFgQA3OqLDGiQpK9C3lXBCsZMiQGY5fl XRjCfPl5jxg6/tIVWfjEJD0YdQ49ZdwOC/sU4eGmVKBRjhz/XKnaFhVoNVr9zpyK YFhfB0pdi4LFkr2XALRERfQXnduKpHT5ngw/GIvNhVfvXnqsacJ33Hf+EtvRbXi3 vx0mxmv4Sl+yRewSl4XOj24Cj2pb0QcUp8KyaiHm12lpVKHMBfWq8OsJwVuIOFHi Dn8VOOgqSzg=Q2qQ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - aarch64, ppc64le, s390x 3. Bugs fixed (https://bugzilla.redhat.com/): 1732329 - Virtual Machine is missing documentation of its properties in yaml editor 1783192 - Guest kernel panic when start RHEL6.10 guest with q35 machine type and virtio disk in cnv 1791753 - [RFE] [SSP] Template validator should check validations in template's parent template 1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic 1848954 - KMP missing CA extensions in cabundle of mutatingwebhookconfiguration 1848956 - KMP requires downtime for CA stabilization during certificate rotation 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1853911 - VM with dot in network name fails to start with unclear message 1854098 - NodeNetworkState on workers doesn't have "status" key due to nmstate-handler pod failure to run "nmstatectl show" 1856347 - SR-IOV : Missing network name for sriov during vm setup 1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS 1859235 - Common Templates - after upgrade there are 2 common templates per each os-workload-flavor combination 1860714 - No API information from `oc explain` 1860992 - CNV upgrade - users are not removed from privileged SecurityContextConstraints 1864577 - [v2v][RHV to CNV non migratable source VM fails to import to Ceph-rbd / File system due to overhead required for Filesystem 1866593 - CDI is not handling vm disk clone 1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs 1868817 - Container-native Virtualization 2.6.0 Images 1873771 - Improve the VMCreationFailed error message caused by VM low memory 1874812 - SR-IOV: Guest Agent expose link-local ipv6 address for sometime and then remove it 1878499 - DV import doesn't recover from scratch space PVC deletion 1879108 - Inconsistent naming of "oc virt" command in help text 1881874 - openshift-cnv namespace is getting stuck if the user tries to delete it while CNV is running 1883232 - Webscale: kubevirt/CNV datavolume importer pod inability to disable sidecar injection if namespace has sidecar injection enabled but VM Template does NOT 1883371 - CVE-2020-26160 jwt-go: access restriction bypass vulnerability 1885153 - [v2v][RHV to CNv VM import] Wrong Network mapping do not show a relevant error message 1885418 - [openshift-cnv] issues with memory overhead calculation when limits are used 1887398 - [openshift-cnv][CNV] nodes need to exist and be labeled first, *before* the NodeNetworkConfigurationPolicy is applied 1889295 - [v2v][VMware to CNV VM import API] diskMappings: volumeMode Block is not passed on to PVC request. 1891285 - Common templates and kubevirt-config cm - update machine-type 1891440 - [v2v][VMware to CNV VM import API]Source VM with no network interface fail with unclear error 1892227 - [SSP] cluster scoped resources are not being reconciled 1893278 - openshift-virtualization-os-images namespace not seen by user 1893646 - [HCO] Pod placement configuration - dry run is not performed for all the configuration stanza 1894428 - Message for VMI not migratable is not clear enough 1894824 - [v2v][VM import] Pick the smallest template for the imported VM, and not always Medium 1894897 - [v2v][VMIO] VMimport CR is not reported as failed when target VM is deleted during the import 1895414 - Virt-operator is accepting updates to the placement of its workload components even with running VMs 1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1898072 - Add Fedora33 to Fedora common templates 1898840 - [v2v] VM import VMWare to CNV Import 63 chars vm name should not fail 1899558 - CNV 2.6 - nmstate fails to set state 1901480 - VM disk io can't worked if namespace have label kubemacpool 1902046 - Not possible to edit CDIConfig (through CDI CR / CDIConfig) 1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service 1903014 - hco-webhook pod in CreateContainerError 1903585 - [v2v] Windows 2012 VM imported from RHV goes into Windows repair mode 1904797 - [VMIO][vmware] A migrated RHEL/Windows VM starts in emergency mode/safe mode when target storage is NFS and target namespace is NOT "default" 1906199 - [CNV-2.5] CNV Tries to Install on Windows Workers 1907151 - kubevirt version is not reported correctly via virtctl 1907352 - VM/VMI link changes to `kubevirt.io~v1~VirtualMachineInstance` on CNV 2.6 1907691 - [CNV] Configuring NodeNetworkConfigurationPolicy caused "Internal error occurred" for creating datavolume 1907988 - VM loses dynamic IP address of its default interface after migration 1908363 - Applying NodeNetworkConfigurationPolicy for different NIC than default disables br-ex bridge and nodes lose connectivity 1908421 - [v2v] [VM import RHV to CNV] Windows imported VM boot failed: INACCESSIBLE BOOT DEVICE error 1908883 - CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference 1909458 - [V2V][VMware to CNV VM import via api using VMIO] VM import to Ceph RBD/BLOCK fails on "qemu-img: /data/disk.img" error 1910857 - Provide a mechanism to enable the HotplugVolumes feature gate via HCO 1911118 - Windows VMI LiveMigration / shutdown fails on 'XML error: non unique alias detected: ua-') 1911396 - Set networkInterfaceMultiqueue false in rhel 6 template for e1000e interface 1911662 - el6 guests don't work properly if virtio bus is specified on various devices 1912908 - Allow using "scsi" bus for disks in template validation 1913248 - Creating vlan interface on top of a bond device via NodeNetworkConfigurationPolicy fails 1913320 - Informative message needed with virtctl image-upload, that additional step is needed from the user 1913717 - Users should have read permitions for golden images data volumes 1913756 - Migrating to Ceph-RBD + Block fails when skipping zeroes 1914177 - CNV does not preallocate blank file data volumes 1914608 - Obsolete CPU models (kubevirt-cpu-plugin-configmap) are set on worker nodes 1914947 - HPP golden images - DV shoudld not be created with WaitForFirstConsumer 1917908 - [VMIO] vmimport pod fail to create when using ceph-rbd/block 1917963 - [CNV 2.6] Unable to install CNV disconnected - requires kvm-info-nfd-plugin which is not mirrored 1919391 - CVE-2021-20206 containernetworking-cni: Arbitrary path injection via type field in CNI configuration 1920576 - HCO can report ready=true when it failed to create a CR for a component operator 1920610 - e2e-aws-4.7-cnv consistently failing on Hyperconverged Cluster Operator 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923979 - kubernetes-nmstate: nmstate-handler pod crashes when configuring bridge device using ip tool 1927373 - NoExecute taint violates pdb; VMIs are not live migrated 1931376 - VMs disconnected from nmstate-defined bridge after CNV-2.5.4->CNV-2.6.0 upgrade 5. ========================================================================== Ubuntu Security Notice USN-4468-1 August 21, 2020 bind9 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Bind. Software Description: - bind9: Internet Domain Name Server Details: Emanuel Almeida discovered that Bind incorrectly handled certain TCP payloads. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-8620) Joseph Gullo discovered that Bind incorrectly handled QNAME minimization when used in certain configurations. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-8621) Dave Feldman, Jeff Warren, and Joel Cunningham discovered that Bind incorrectly handled certain truncated responses to a TSIG-signed request. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2020-8622) Lyu Chiy discovered that Bind incorrectly handled certain queries. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2020-8623) Joop Boonen discovered that Bind incorrectly handled certain subdomain update-policy rules. A remote attacker granted privileges to change certain parts of a zone could use this issue to change other contents of the zone, contrary to expectations. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-8624) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: bind9 1:9.16.1-0ubuntu2.3 Ubuntu 18.04 LTS: bind9 1:9.11.3+dfsg-1ubuntu1.13 Ubuntu 16.04 LTS: bind9 1:9.10.3.dfsg.P4-8ubuntu1.17 In general, a standard system update will make all the necessary changes. 7) - x86_64 3. Bug Fix(es): * BIND stops DNSKEY lookup in get_dst_key() when a key with unsupported algorithm is found first [RHEL7] (BZ#1884530) 4. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHEA-2020:5633 All OpenShift Container Platform users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html. Bugs fixed (https://bugzilla.redhat.com/): 1823765 - nfd-workers crash under an ipv6 environment 1838802 - mysql8 connector from operatorhub does not work with metering operator 1838845 - Metering operator can't connect to postgres DB from Operator Hub 1841883 - namespace-persistentvolumeclaim-usage query returns unexpected values 1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1868294 - NFD operator does not allow customisation of nfd-worker.conf 1882310 - CVE-2020-24750 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration 1890672 - NFD is missing a build flag to build correctly 1890741 - path to the CA trust bundle ConfigMap is broken in report operator 1897346 - NFD worker pods not scheduler on a 3 node master/worker cluster 1898373 - Metering operator failing upgrade from 4.4 to 4.6 channel 1900125 - FIPS error while generating RSA private key for CA 1906129 - OCP 4.7: Node Feature Discovery (NFD) Operator in CrashLoopBackOff when deployed from OperatorHub 1908492 - OCP 4.7: Node Feature Discovery (NFD) Operator Custom Resource Definition file in olm-catalog is not in sync with the one in manifests dir leading to failed deployment from OperatorHub 1913837 - The CI and ART 4.7 metering images are not mirrored 1914869 - OCP 4.7 NFD - Operand configuration options for NodeFeatureDiscovery are empty, no supported image for ppc64le 1916010 - olm skip range is set to the wrong range 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923998 - NFD Operator is failing to update and remains in Replacing state 5

Trust: 1.8

sources: NVD: CVE-2020-8622 // VULHUB: VHN-186747 // VULMON: CVE-2020-8622 // PACKETSTORM: 168899 // PACKETSTORM: 159511 // PACKETSTORM: 159981 // PACKETSTORM: 161742 // PACKETSTORM: 158940 // PACKETSTORM: 159985 // PACKETSTORM: 161536 // PACKETSTORM: 158949

AFFECTED PRODUCTS

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.17.0

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.12.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.16.5

Trust: 1.0

vendor:synologymodel:dns serverscope:ltversion:2.2.2-5028

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:lteversion:8.5.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.9.3

Trust: 1.0

vendor:iscmodel:bindscope:gteversion:9.0.0

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.11.21

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.17.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:gteversion:8.0.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.11.21

Trust: 1.0

sources: NVD: CVE-2020-8622

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8622
value: MEDIUM

Trust: 1.0

security-officer@isc.org: CVE-2020-8622
value: MEDIUM

Trust: 1.0

VULHUB: VHN-186747
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-8622
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-8622
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-186747
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-8622
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-186747 // VULMON: CVE-2020-8622 // NVD: CVE-2020-8622 // NVD: CVE-2020-8622

PROBLEMTYPE DATA

problemtype:CWE-617

Trust: 1.1

sources: VULHUB: VHN-186747 // NVD: CVE-2020-8622

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 158940 // PACKETSTORM: 158949

PATCH

title:Red Hat: Moderate: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204183 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204992 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: bind security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205203 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: bind security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205011 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: bind security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20204500 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2021-1457url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1457

Trust: 0.1

title:IBM: Security Bulletin: Vulnerability in bind affects IBM Integrated Analytics Systemurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=5df18782fa35770f1ccb0a60bd4d1fa5

Trust: 0.1

title:Debian Security Advisories: DSA-4752-1 bind9 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=803076d91d2c644d2eb525aea5dfdae2

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1564url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1564

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.5.20 bug fix and golang security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20205118 - Security Advisory

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title: - url:https://github.com/NikulinMS/13-01-hw

Trust: 0.1

sources: VULMON: CVE-2020-8622

EXTERNAL IDS

db:NVDid:CVE-2020-8622

Trust: 2.0

db:PACKETSTORMid:158940

Trust: 0.2

db:PACKETSTORMid:158949

Trust: 0.2

db:PACKETSTORMid:159511

Trust: 0.2

db:PACKETSTORMid:159981

Trust: 0.2

db:PACKETSTORMid:159985

Trust: 0.2

db:PACKETSTORMid:160207

Trust: 0.1

db:PACKETSTORMid:159845

Trust: 0.1

db:PACKETSTORMid:159004

Trust: 0.1

db:PACKETSTORMid:160205

Trust: 0.1

db:CNNVDid:CNNVD-202008-1071

Trust: 0.1

db:VULHUBid:VHN-186747

Trust: 0.1

db:VULMONid:CVE-2020-8622

Trust: 0.1

db:PACKETSTORMid:168899

Trust: 0.1

db:PACKETSTORMid:161742

Trust: 0.1

db:PACKETSTORMid:161536

Trust: 0.1

sources: VULHUB: VHN-186747 // VULMON: CVE-2020-8622 // PACKETSTORM: 168899 // PACKETSTORM: 159511 // PACKETSTORM: 159981 // PACKETSTORM: 161742 // PACKETSTORM: 158940 // PACKETSTORM: 159985 // PACKETSTORM: 161536 // PACKETSTORM: 158949 // NVD: CVE-2020-8622

REFERENCES

url:https://kb.isc.org/docs/cve-2020-8622

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20200827-0003/

Trust: 1.1

url:https://www.synology.com/security/advisory/synology_sa_20_19

Trust: 1.1

url:https://www.debian.org/security/2020/dsa-4752

Trust: 1.1

url:https://security.gentoo.org/glsa/202008-19

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html

Trust: 1.1

url:https://usn.ubuntu.com/4468-1/

Trust: 1.1

url:https://usn.ubuntu.com/4468-2/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dqn62gbmcic5ay4kyadgxnkvy6ajksje/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/zkamjzxr66p6s5leu4sn7ussncwtxexp/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-8622

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-8622

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-8623

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-8623

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-8624

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8624

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-20907

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20388

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-15165

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14382

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1971

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19221

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-7595

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16168

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24659

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9327

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17450

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16935

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20916

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5018

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19956

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14422

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19906

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20387

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-15999

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-1752

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-15903

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8492

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-20843

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-6405

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-20843

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3121

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13632

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10029

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13630

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14040

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8619

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13631

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.2

url:https://usn.ubuntu.com/4468-1

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/zkamjzxr66p6s5leu4sn7ussncwtxexp/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dqn62gbmcic5ay4kyadgxnkvy6ajksje/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8619

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/bind9

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4183

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:4992

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16300

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10105

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-15166

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25705

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26160

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16230

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6829

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12403

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16845

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14467

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16229

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14465

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14882

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25683

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14461

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14881

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14463

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29652

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14351

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10105

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14461

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14468

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14882

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15586

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16452

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16230

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14468

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14467

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14462

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29661

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25682

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16300

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14462

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16229

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12400

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16451

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10103

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16228

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0799

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14463

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16451

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14470

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14470

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14465

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16452

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.p4-8ubuntu1.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.13

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8620

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/bind9/1:9.16.1-0ubuntu2.3

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5011

Trust: 0.1

url:https://access.redhat.com/errata/rhea-2020:5633

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20907

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25211

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:5635

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5018

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19956

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15157

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20387

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20916

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19221

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15165

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17546

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3898

Trust: 0.1

url:https://usn.ubuntu.com/4468-2

Trust: 0.1

sources: VULHUB: VHN-186747 // PACKETSTORM: 168899 // PACKETSTORM: 159511 // PACKETSTORM: 159981 // PACKETSTORM: 161742 // PACKETSTORM: 158940 // PACKETSTORM: 159985 // PACKETSTORM: 161536 // PACKETSTORM: 158949 // NVD: CVE-2020-8622

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 159511 // PACKETSTORM: 159981 // PACKETSTORM: 161742 // PACKETSTORM: 159985 // PACKETSTORM: 161536

SOURCES

db:VULHUBid:VHN-186747
db:VULMONid:CVE-2020-8622
db:PACKETSTORMid:168899
db:PACKETSTORMid:159511
db:PACKETSTORMid:159981
db:PACKETSTORMid:161742
db:PACKETSTORMid:158940
db:PACKETSTORMid:159985
db:PACKETSTORMid:161536
db:PACKETSTORMid:158949
db:NVDid:CVE-2020-8622

LAST UPDATE DATE

2025-04-30T01:15:25.463000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-186747date:2021-12-02T00:00:00
db:VULMONid:CVE-2020-8622date:2023-11-07T00:00:00
db:NVDid:CVE-2020-8622date:2024-11-21T05:39:08.607

SOURCES RELEASE DATE

db:VULHUBid:VHN-186747date:2020-08-21T00:00:00
db:VULMONid:CVE-2020-8622date:2020-08-21T00:00:00
db:PACKETSTORMid:168899date:2020-08-28T19:12:00
db:PACKETSTORMid:159511date:2020-10-08T16:49:42
db:PACKETSTORMid:159981date:2020-11-10T14:55:46
db:PACKETSTORMid:161742date:2021-03-10T16:02:43
db:PACKETSTORMid:158940date:2020-08-21T21:44:34
db:PACKETSTORMid:159985date:2020-11-10T14:56:23
db:PACKETSTORMid:161536date:2021-02-25T15:26:54
db:PACKETSTORMid:158949date:2020-08-25T17:19:25
db:NVDid:CVE-2020-8622date:2020-08-21T21:15:12.247