First published: Wed May 20 2020(Updated: )
USN-4365-1 fixed several vulnerabilities in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM. Original advisory details: Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind incorrectly limited certain fetches. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service, or possibly use Bind to perform a reflection attack. (CVE-2020-8616) Tobias Klein discovered that Bind incorrectly handled checking TSIG validity. A remote attacker could use this issue to cause Bind to crash, resulting in a denial of service, or possibly perform other attacks. (CVE-2020-8617)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/bind9 | <1:9.9.5.dfsg-3ubuntu0.19+esm2 | 1:9.9.5.dfsg-3ubuntu0.19+esm2 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/bind9 | <1:9.8.1.dfsg.P1-4ubuntu0.30 | 1:9.8.1.dfsg.P1-4ubuntu0.30 |
Ubuntu Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-4365-2.
The software affected by this vulnerability is Bind version 9.9.5.dfsg-3ubuntu0.19+esm2 on Ubuntu 12.04 ESM, and Bind version 9.8.1.dfsg.P1-4ubuntu0.30 on Ubuntu 14.04.
The severity of this vulnerability has not been provided in the advisory. Please refer to the referenced CVE links for more information.
To fix the Bind vulnerabilities on Ubuntu 12.04, you can install the provided update package 1:9.8.1.dfsg.P1-4ubuntu0.30.
To fix the Bind vulnerabilities on Ubuntu 14.04, you can install the provided update package 1:9.9.5.dfsg-3ubuntu0.19+esm2.