==========================================================================
Ubuntu Security Notice USN-4365-1
May 19, 2020
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 20.04 LTS
– Ubuntu 19.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
– bind9: Internet Domain Name Server
Details:
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind
incorrectly limited certain fetches. A remote attacker could possibly use
this issue to cause Bind to consume resources, leading to a denial of
service, or possibly use Bind to perform a reflection attack.
(CVE-2020-8616)
Tobias Klein discovered that Bind incorrectly handled checking TSIG
validity. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly perform other attacks.
(CVE-2020-8617)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
bind9 1:9.16.1-0ubuntu2.1
Ubuntu 19.10:
bind9 1:9.11.5.P4+dfsg-5.1ubuntu2.2
Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.12
Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.16
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4365-1
CVE-2020-8616, CVE-2020-8617
Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.16.1-0ubuntu2.1
https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.P4+dfsg-5.1ubuntu2.2
https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.12
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.16
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl7D2K8ACgkQZWnYVadE
vpONxg/+Kb8Z4OAbEWWTP5n9MMnexIU+VEFf9a+OS2RUbFxq6eZxHHdvsFAPkeKj
6JoCxryQnKKD1Ri2HaqUUGW0G34W3yHX7K7lawwyGk2Z38yJX5pBhPGRxYAe5DZQ
nIUiWtMcacAu+Fpg7hDKgnidunx0of3d1ZzXMVrpjf7R7RWraZkZIMWZ7hWAN4QQ
zxO9fxuYaCS495C+wd6MGPnuKTQpabvi8YewbI6AmLt+EOpBgKDn4ebPef9fySkO
CdT2JnXOQfy2sn80btie4HXX56m+4oTPsyM6PQGqBlIpTMHf4aamckmiqvJb52rK
BWBeKk2rkZ3bqK1iPuQPLfFAZXsgYFezwOcRQlv94D03Gei17WnWY/r3KDfud3d3
oHRT0OhgIU31hgkyO53jk+cjPB0+89p0sf7Mhx0Mr9QWMw11gDT51iT9eZpl1TTR
tVHvprU354xOGTmudYOhOCD/B1cc9DKgGkcXdLB7l0PV352VPiiRDIt7r/G8x43Z
hKczKYXQjsbFPMedurGCbTwZNFdGpnmTjjYEaKW1wNLSBISGZE5R1Reuf7b8dBU1
KH1k15TnuKSzD9zyXAfCJsIaMQ2NXMvDDeblKilnh68peHE68UyB6eL2OQJV5mSf
zKmHSJ4oFdXmBkmsvMXuaWbm1ujCNs4B0RiwTobYO/+kATdEQPk=
=xMDi
—–END PGP SIGNATURE—–
—