USN-5747-1: Bind vulnerabilities

Publication date

29 November 2022

Overview

Several security issues were fixed in Bind.


Packages

  • bind9 - Internet Domain Name Server

Details

It was discovered that Bind incorrectly handled large query name when using
lightweight resolver protocol. A remote attacker could use this issue to
consume resources, leading to a denial of service. (CVE-2016-2775)

It was discovered that Bind incorrectly handled large zone data size
received via AXFR response. A remote authenticated attacker could use this
issue to consume resources, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS. (CVE-2016-6170)

It was discovered that Bind incorrectly handled large query name when using
lightweight resolver protocol. A remote attacker could use this issue to
consume resources, leading to a denial of service. (CVE-2016-2775)

It was discovered that Bind incorrectly handled large zone data size
received via AXFR response. A remote authenticated attacker could use this
issue to consume resources, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS. (CVE-2016-6170)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
16.04 xenial bind9 –  1:9.10.3.dfsg.P4-8ubuntu1.19+esm5  
lwresd –  1:9.10.3.dfsg.P4-8ubuntu1.19+esm5  
14.04 trusty lwresd –  1:9.9.5.dfsg-3ubuntu0.19+esm9  
bind9 –  1:9.9.5.dfsg-3ubuntu0.19+esm9  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›