User: Password:
|
|
Subscribe / Log in / New account

Ubuntu alert USN-1657-1 (bind9)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-1657-1] Bind vulnerability
Date:  Thu, 06 Dec 2012 08:13:23 -0500
Message-ID:  <50C099F3.9000205@canonical.com>
Archive-link:  Article, Thread

========================================================================== Ubuntu Security Notice USN-1657-1 December 06, 2012 bind9 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.10 - Ubuntu 12.04 LTS Summary: Bind could be made to crash if it received specially crafted network traffic. Software Description: - bind9: Internet Domain Name Server Details: It was discovered that Bind incorrectly handled certain crafted queries when DNS64 was enabled. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: bind9 1:9.8.1.dfsg.P1-4.2ubuntu3.1 Ubuntu 12.04 LTS: bind9 1:9.8.1.dfsg.P1-4ubuntu0.5 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1657-1 CVE-2012-5688 Package Information: https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P... https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds