USN-2925-1: Bind vulnerabilities
9 March 2016
Bind could be made to crash if it received specially crafted network traffic.
Releases
Packages
- bind9 - Internet Domain Name Server
Details
It was discovered that Bind incorrectly handled input received by the rndc
control channel. A remote attacker could possibly use this issue to cause
Bind to crash, resulting in a denial of service. (CVE-2016-1285)
It was discovered that Bind incorrectly parsed resource record signatures
for DNAME resource records. A remote attacker could possibly use this issue
to cause Bind to crash, resulting in a denial of service. (CVE-2016-1286)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
Ubuntu 14.04
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.