You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa bind9

Sigurnosni nedostatak programskog paketa bind9

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4197-1
November 21, 2019

bind9 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 19.04
– Ubuntu 18.04 LTS

Summary:

Bind could be made to consume resources if it received specially crafted
network traffic.

Software Description:
– bind9: Internet Domain Name Server

Details:

It was discovered that Bind incorrectly handled certain TCP-pipelined
queries. A remote attacker could possibly use this issue to cause Bind to
consume resources, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
bind9 1:9.11.5.P4+dfsg-5.1ubuntu2.1

Ubuntu 19.04:
bind9 1:9.11.5.P1+dfsg-1ubuntu2.6

Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.11

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4197-1
CVE-2019-6477

Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.P4+dfsg-5.1ubuntu2.1
https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.P1+dfsg-1ubuntu2.6
https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.11

—–BEGIN PGP SIGNATURE—–
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=AlQN
—–END PGP SIGNATURE—–

AutorVlatka Misic
Cert idNCERT-REF-2019-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa JBoss Web Server

Otkriveni su sigurnosni nedostaci u programskom paketu JBoss Web Server za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju...

Close