[USN-3893-2] Bind vulnerabilities

protocol=”application/pgp-signature”; boundary=”=-16srUqDdf01u7sTRcXIg”

–=-16srUqDdf01u7sTRcXIg

Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3893-2
February 25, 2019

bind9 vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Bind.

Software Description:
– bind9: Internet Domain Name Server

Details:

USN-3893-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0It was discovered that Bind incorrectly handled certain trust anchors
=C2=A0when used with the “managed-keys” feature. A remote attacker could
=C2=A0possibly use this issue to cause Bind to crash, resulting in a denial
=C2=A0of service. (CVE-2018-5745)

=C2=A0It was discovered that Bind incorrectly handled certain controls for
=C2=A0zone transfers, contrary to expectations. (CVE-2019-6465)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 bind9=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A01:9.8.1.dfsg.P1-4ubuntu0.27

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3893-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3893-1
=C2=A0 CVE-2018-5745, CVE-2019-6465
–=-16srUqDdf01u7sTRcXIg

Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQIcBAABCAAGBQJcc/rbAAoJEEW851uECx9p4boP/RCAtnHBt9tzgJa2ENOjkadv
n6gyxC5hW3TGmEapn4wQaWcOKNaJdmxsiYtpEQhSSv3zS9BbQNyukmA/e6oEgj7d
Rra8tlRliEwatAw+quJ/cIy5dxJTius/TlOh669TL2tuLGnL3FTGJwvfUPt43VJl
c9eUWc4e7Ph68x3YqmnPXSzsGDeB5MYaH0tUSWDbQljxfRDtuH4C1eq/nNhgrX5v
tsmD8Z/MHay3AKUE/qilhuqE9STyVQZUgfAhk6N+FlqEvjJnFG/KYUap7COMXptN
r0CwOwmOczauhlNWa4t5BZ4qm56ewcJo3FxP5iPrTQEOCNjO9TSkTS4wYf3LX2S7
0/OInkMIKEuGZ06ZdfCH+GhT9r/Qs4FOHR1Sdd2TkKnoaR12i39Il5eg30u1354v
TZEBV9Pl2IUnB6T/bPeZcnbKAfvdwxHzHQy3LENeRo/4QOY8wBqAf4/7+kEVgSPo
HLc7WgxVGgnZ3uE1Sz1F5X/7LSsV5VCRqUjHkyfpmPZGXAXinpgGP+piBqTTxwpT
NLGNrtC/lE3Lok9lHiryFsOUftWhS+Bb6o8Vo1nIqXj/6nxEZV6M8tkjmmjYf4lh
TYdN9SVVdN0vYr0k0cwsY7CoVgMK/LasrGMjcaFWsxoL1ngfBybTvdg774nUtc4G
GTvY1638hX4Aoqyimf4T
=/evz
—–END PGP SIGNATURE—–

–=-16srUqDdf01u7sTRcXIg–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK