|Category:||CentOS Local Security Checks|
|Title:||CentOS: Security Advisory for bind (CESA-2020:4183)|
|Summary:||The remote host is missing an update for the 'bind'; package(s) announced via the CESA-2020:4183 advisory.|
The remote host is missing an update for the 'bind'
package(s) announced via the CESA-2020:4183 advisory.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named), a resolver
library (routines for applications to use when interfacing with DNS), and
tools for verifying that the DNS server is operating correctly.
* bind: truncated TSIG response can lead to an assertion failure
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
'bind' package(s) on CentOS 6.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-8622|
Debian Security Information: DSA-4752 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:1699 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:1701 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.