==========================================================================
Ubuntu Security Notice USN-3893-1
February 22, 2019
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
– bind9: Internet Domain Name Server
Details:
Toshifumi Sakaguchi discovered that Bind incorrectly handled memory. A
remote attacker could possibly use this issue to cause Bind to consume
resources, leading to a denial of service. This issue only affected Ubuntu
18.04 LTS and Ubuntu 18.10. (CVE-2018-5744)
It was discovered that Bind incorrectly handled certain trust anchors when
used with the “managed-keys” feature. A remote attacker could possibly use
this issue to cause Bind to crash, resulting in a denial of service.
(CVE-2018-5745)
It was discovered that Bind incorrectly handled certain controls for zone
transfers, contrary to expectations. (CVE-2019-6465)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
bind9 1:9.11.4+dfsg-3ubuntu5.1
Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.5
Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.12
Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.19
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3893-1
CVE-2018-5744, CVE-2018-5745, CVE-2019-6465
Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.11.4+dfsg-3ubuntu5.1
https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.5
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.12
https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-3ubuntu0.19
—–BEGIN PGP SIGNATURE—–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=zOBy
—–END PGP SIGNATURE—–
—