USN-4365-2: Bind vulnerabilities
20 May 2020
Several security issues were fixed in Bind.
- bind9 - Internet Domain Name Server
USN-4365-1 fixed several vulnerabilities in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.
Original advisory details:
Lior Shafir, Yehuda Afek, and Anat Bremler-Barr discovered that Bind
incorrectly limited certain fetches. A remote attacker could possibly use
this issue to cause Bind to consume resources, leading to a denial of
service, or possibly use Bind to perform a reflection attack.
Tobias Klein discovered that Bind incorrectly handled checking TSIG
validity. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly perform other attacks.
- USN-4365-1: libisccfg-export140, libisc1100, libisccfg-export140-udeb, liblwres141, libisc-export169-udeb, liblwres161, libbind-dev, libisccc140, libdns-export1104, bind9-libs, libbind9-160, host, libdns1104, libisc-export1100-udeb, libdns-export1104-udeb, libbind9-140, liblwres160, bind9utils, bind9-doc, libisccfg163, libirs-export161-udeb, libisc-export1100, libisccfg-export163, libdns-export1100, libisccc160, bind9-utils, libbind-export-dev, libisccfg-export163-udeb, libdns162, libisc-export160, bind9-dnsutils, libisccc-export140, libirs141, libdns1100, libbind9-161, libisc-export169, libisccfg-export160, dnsutils, libisccc-export160-udeb, libisccfg-export160-udeb, libisccc-export161-udeb, libirs-export160-udeb, libirs161, libisc160, libisccfg160, libdns-export1100-udeb, bind9, bind9-host, libirs-export160, libirs-export141, libisc169, libisccc-export160, libdns-export162, libisccc-export140-udeb, libirs-export141-udeb, libirs-export161, libdns-export162-udeb, libisccfg140, libisccc161, lwresd, libirs160, libisccc-export161, libisc-export160-udeb