Ubuntu alert USN-7241-1 (bind9)
From: | Marc Deslauriers <marc.deslauriers@canonical.com> | |
To: | "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com> | |
Subject: | [USN-7241-1] Bind vulnerabilities | |
Date: | Wed, 29 Jan 2025 14:54:02 -0500 | |
Message-ID: | <f9a7743b-6962-4b79-8433-de584e89413e@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7241-1 January 29, 2025 bind9 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in Bind. Software Description: - bind9: Internet Domain Name Server Details: Toshifumi Sakaguchi discovered that Bind incorrectly handled many records in the additional section. A remote attacker could possibly use this issue to cause Bind to consume CPU resources, leading to a denial of service. (CVE-2024-11187) Jean-François Billaud discovered that the Bind DNS-over-HTTPS implementation incorrectly handled a heavy query load. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. (CVE-2024-12705) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.10 bind9 1:9.20.0-2ubuntu3.1 Ubuntu 24.04 LTS bind9 1:9.18.30-0ubuntu0.24.04.2 Ubuntu 22.04 LTS bind9 1:9.18.30-0ubuntu0.22.04.2 Ubuntu 20.04 LTS bind9 1:9.18.30-0ubuntu0.20.04.2 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7241-1 CVE-2024-11187, CVE-2024-12705 Package Information: https://launchpad.net/ubuntu/+source/bind9/1:9.20.0-2ubun... https://launchpad.net/ubuntu/+source/bind9/1:9.18.30-0ubu... https://launchpad.net/ubuntu/+source/bind9/1:9.18.30-0ubu... https://launchpad.net/ubuntu/+source/bind9/1:9.18.30-0ubu...
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmeah1sFAwAAAAAACgkQZWnYVadEvpMe eBAAshlKM+k5NmnENpK6upbArAJDQEZVl/VeNyScHW3M5JhMo/d54H+WtFim9xi+FHNMY9fYA/wO U1u2F94L2SWOTbTN3ncqfSQjkCWZxgezMXpq89uxi+9ZZcD3tpiuTASvxh9gJgHLXBJUozbV2RE7 dJTXk1jyNv4yqJEe/PfqJnB5VdK6AkC7JKvLO7fvTIPcwc7pV5my2iqxhtweIeLrALpYEe7pweYY jgUd1ZCIRzX1LJcX8+WUXWFNjX1FHbTkoVcgANmLjIrOmPW6J+CgMRpUstr3xFSvoIs3iDmtMHms nU0wy+6XTc/5FWNo9CY2yngURXikWDO/Dc6KGaDKTsDMXf71vNDFFmZdr7st7fcIBAkCscV5+S/m 0z/ctH4hoKT9sGzKiILdVpWyLrEey8mxwhzHC1QYqxcGPcAoIcvZqIicVIuoxSbop8Xf+BvdbieS xUJxkUUme4GPEVRdp1UIr96uBG9zee1WoTssKlXGq8YE83xDcTDA5Op9on15eMa0Q3F5a9D97InH pFifB1alGiE126323+7bnmt/zOEtGeACOjmvJfSjWJKxryjwbNJBP5ae6GCwyyeWR3e61aqIo6co 98OBntHFMxM/qW/4e9TS1iCWlAlMZcuh1HAKkPWrIxRJ8u3RSEpwUvDEOpNe+BEGvAEXkt4kKh5r Et0= =FVdH -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)