File _patchinfo of Package patchinfo.11991
<patchinfo incident="11991"> <issue tracker="cve" id="2020-8616"/> <issue tracker="cve" id="2018-5741"/> <issue tracker="cve" id="2020-8617"/> <issue tracker="bnc" id="1118367">Please add proper dependencies in lwresd.service against nss-lookup.target</issue> <issue tracker="bnc" id="1118368">Please include proper dependencies in named.service against nss-lookup.target</issue> <issue tracker="bnc" id="1171740">VUL-0: CVE-2020-8616, CVE-2020-8617: bind: two vulnerabilities</issue> <issue tracker="bnc" id="1109160">VUL-1: CVE-2018-5741: bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies</issue> <packager>jmoellers</packager> <rating>important</rating> <category>security</category> <summary>Security update for bind</summary> <description>This update for bind fixes the following issues: - Amended documentation referring to rule types "krb5-subdomain" and "ms-subdomain". This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. [CVE-2018-5741] - Further limit the number of queries that can be triggered from a request. Root and TLD servers are no longer exempt from max-recursion-queries. Fetches for missing name server address records are limited to 4 for any domain. [CVE-2020-8616] - Replaying a TSIG BADTIME response as a request could trigger an assertion failure. [CVE-2020-8617] [bsc#1109160, bsc#1171740, CVE-2018-5741, bind-CVE-2018-5741.patch, CVE-2020-8616, bind-CVE-2020-8616.patch, CVE-2020-8617, bind-CVE-2020-8617.patch] - Don't rely on /etc/insserv.conf anymore for proper dependencies against nss-lookup.target in named.service and lwresd.service (bsc#1118367 bsc#1118368) - Using a drop-in file </description> </patchinfo>