Ubuntu 5626-2: Bind vulnerabilities | LinuxSecurity.com

Advisories

==========================================================================
Ubuntu Security Notice USN-5626-2
September 21, 2022

bind9 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server

Details:

USN-5626-1 fixed several vulnerabilities in Bind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind
 incorrectly handled large delegations. A remote attacker could possibly use
 this issue to reduce performance, leading to a denial of service.
 (CVE-2022-2795)

 It was discovered that Bind incorrectly handled memory when processing
 ECDSA DNSSEC verification. A remote attacker could use this issue to
 consume resources, leading to a denial of service. (CVE-2022-38177)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  bind9                           1:9.10.3.dfsg.P4-8ubuntu1.19+esm3

Ubuntu 14.04 ESM:
  bind9                           1:9.9.5.dfsg-3ubuntu0.19+esm7

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5626-2
  https://ubuntu.com/security/notices/USN-5626-1
  CVE-2022-2795, CVE-2022-38177

Ubuntu 5626-2: Bind vulnerabilities

September 21, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in Bind. Software Description: - bind9: Internet Domain Name Server Details: USN-5626-1 fixed several vulnerabilities in Bind. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind incorrectly handled large delegations. A remote attacker could possibly use this issue to reduce performance, leading to a denial of service. (CVE-2022-2795) It was discovered that Bind incorrectly handled memory when processing ECDSA DNSSEC verification. A remote attacker could use this issue to consume resources, leading to a denial of service. (CVE-2022-38177)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: bind9 1:9.10.3.dfsg.P4-8ubuntu1.19+esm3 Ubuntu 14.04 ESM: bind9 1:9.9.5.dfsg-3ubuntu0.19+esm7 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5626-2

https://ubuntu.com/security/notices/USN-5626-1

CVE-2022-2795, CVE-2022-38177

Severity
Ubuntu Security Notice USN-5626-2

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.