First published: Wed Sep 20 2023(Updated: )
It was discovered that Bind incorrectly handled certain control channel messages. A remote attacker with access to the control channel could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2023-3341) Robert Story discovered that Bind incorrectly handled certain DNS-over-TLS queries. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 23.04. (CVE-2023-4236)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/bind9 | <1:9.18.12-1ubuntu1.2 | 1:9.18.12-1ubuntu1.2 |
=23.04 | ||
All of | ||
ubuntu/bind9 | <1:9.18.12-0ubuntu0.22.04.3 | 1:9.18.12-0ubuntu0.22.04.3 |
=22.04 | ||
All of | ||
ubuntu/bind9 | <1:9.16.1-0ubuntu2.16 | 1:9.16.1-0ubuntu2.16 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6390-1 has a severity rating of moderate.
USN-6390-1 affects Bind by allowing a remote attacker with access to the control channel to cause Bind to crash, resulting in a denial of service.
The remedy for USN-6390-1 is to upgrade to Bind version 1:9.18.12-1ubuntu1.2 or later.
USN-6390-1 affects Ubuntu versions 23.04, 22.04, and 20.04.
You can find more information about USN-6390-1 on the Ubuntu Security Notices website.