[USN-3893-1] Bind vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”F7T70T1nsABcBLDlG4NqOGI0GfXyP6vvw”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–F7T70T1nsABcBLDlG4NqOGI0GfXyP6vvw

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3893-1] Bind vulnerabilities

–B1oRDOkiXuuETue70p1An3tMr877S9GtX

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3893-1
February 22, 2019

bind9 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Bind.

Software Description:
– bind9: Internet Domain Name Server

Details:

Toshifumi Sakaguchi discovered that Bind incorrectly handled memory. A
remote attacker could possibly use this issue to cause Bind to consume
resources, leading to a denial of service. This issue only affected Ubunt=
u
18.04 LTS and Ubuntu 18.10. (CVE-2018-5744)

It was discovered that Bind incorrectly handled certain trust anchors whe=
n
used with the “managed-keys” feature. A remote attacker could possibly us=
e
this issue to cause Bind to crash, resulting in a denial of service.
(CVE-2018-5745)

It was discovered that Bind incorrectly handled certain controls for zone=

transfers, contrary to expectations. (CVE-2019-6465)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
bind9 1:9.11.4+dfsg-3ubuntu5.1

Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.5

Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.12

Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.19

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3893-1
CVE-2018-5744, CVE-2018-5745, CVE-2019-6465

Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.11.4+dfsg-3ubuntu5.1
https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.5
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.12=

https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-3ubuntu0.19

–B1oRDOkiXuuETue70p1An3tMr877S9GtX–

–F7T70T1nsABcBLDlG4NqOGI0GfXyP6vvw

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=zOBy
—–END PGP SIGNATURE—–

–F7T70T1nsABcBLDlG4NqOGI0GfXyP6vvw–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK