USN-4468-1 fixed a vulnerability in Bind. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.
Original advisory details:
Dave Feldman, Jeff Warren, and Joel Cunningham discovered that Bind
incorrectly handled certain truncated responses to a TSIG-signed request. A
remote attacker could possibly use this issue to cause Bind to crash,
resulting in a denial of service. (CVE-2020-8622)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | bind9 | < 1:9.9.5.dfsg-3ubuntu0.19+esm3 | UNKNOWN |
Ubuntu | 14.04 | noarch | bind9 | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | bind9-host | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | bind9utils | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | dnsutils | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | libbind-dev | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | libbind9-90 | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | libdns100 | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | libisc95 | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |
Ubuntu | 14.04 | noarch | libisccc90 | < 1:9.9.5.dfsg-3ubuntu0.19 | UNKNOWN |