Ubuntu 5747-1: Bind vulnerabilities | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5747-1
November 29, 2022

bind9 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server

Details:

It was discovered that Bind incorrectly handled large query name when using
lightweight resolver protocol. A remote attacker could use this issue to
consume resources, leading to a denial of service. (CVE-2016-2775)

It was discovered that Bind incorrectly handled large zone data size
received via AXFR response. A remote authenticated attacker could use this
issue to consume resources, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS. (CVE-2016-6170)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  bind9                           1:9.10.3.dfsg.P4-8ubuntu1.19+esm5
  lwresd                          1:9.10.3.dfsg.P4-8ubuntu1.19+esm5

Ubuntu 14.04 ESM:
  bind9                           1:9.9.5.dfsg-3ubuntu0.19+esm9
  lwresd                          1:9.9.5.dfsg-3ubuntu0.19+esm9

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5747-1
  CVE-2016-2775, CVE-2016-6170

Ubuntu 5747-1: Bind vulnerabilities

November 29, 2022
Several security issues were fixed in Bind.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in Bind. Software Description: - bind9: Internet Domain Name Server Details: It was discovered that Bind incorrectly handled large query name when using lightweight resolver protocol. A remote attacker could use this issue to consume resources, leading to a denial of service. (CVE-2016-2775) It was discovered that Bind incorrectly handled large zone data size received via AXFR response. A remote authenticated attacker could use this issue to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-6170)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: bind9 1:9.10.3.dfsg.P4-8ubuntu1.19+esm5 lwresd 1:9.10.3.dfsg.P4-8ubuntu1.19+esm5 Ubuntu 14.04 ESM: bind9 1:9.9.5.dfsg-3ubuntu0.19+esm9 lwresd 1:9.9.5.dfsg-3ubuntu0.19+esm9 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5747-1

CVE-2016-2775, CVE-2016-6170

Severity
Ubuntu Security Notice USN-5747-1

Package Information