Linux Security
    Linux Security
    Linux Security

    Debian: DSA-4857-1: bind9 security update

    Date 18 Feb 2021
    159
    Posted By LinuxSecurity Advisories
    A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4857-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    February 18, 2021                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : bind9
    CVE ID         : CVE-2020-8625
    Debian Bug     : 983004
    
    A buffer overflow vulnerability was discovered in the SPNEGO
    implementation affecting the GSSAPI security policy negotiation in BIND,
    a DNS server implementation, which could result in denial of service
    (daemon crash), or potentially the execution of arbitrary code.
    
    For the stable distribution (buster), this problem has been fixed in
    version 1:9.11.5.P4+dfsg-5.1+deb10u3.
    
    We recommend that you upgrade your bind9 packages.
    
    For the detailed security status of bind9 please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/bind9
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.