Hide Forgot
As per upstream advisory: Attempting to verify a truncated response to a TSIG-signed request leads to an assertion failure. An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Acknowledgments: Name: ISC Upstream: Dave Feldman (Oracle), Jeff Warren (Oracle), Joel Cunningham (Oracle)
Created attachment 1711687 [details] Patch against 9.11.22
External References: https://kb.isc.org/docs/cve-2020-8622
Created bind tracking bugs for this issue: Affects: fedora-all [bug 1870904]
Upstream commit: https://gitlab.isc.org/isc-projects/bind9/-/commit/6ed167ad0a647dff20c8cb08c944a7967df2d415
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:4183 https://access.redhat.com/errata/RHSA-2020:4183
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8622
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4500 https://access.redhat.com/errata/RHSA-2020:4500
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:4992 https://access.redhat.com/errata/RHSA-2020:4992
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:5011 https://access.redhat.com/errata/RHSA-2020:5011
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:5203 https://access.redhat.com/errata/RHSA-2020:5203