USN-3956-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-3956-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-3956-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3956-2
Related
Published
2019-05-09T12:13:31.561884Z
Modified
2019-05-09T12:13:31.561884Z
Summary
bind9 vulnerability
Details

USN-3956-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.

References

Affected packages

Ubuntu:Pro:14.04:LTS / bind9

Package

Name
bind9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.9.5.dfsg-3ubuntu0.19+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "lwresd": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "bind9utils": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "bind9": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libbind-dev": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "host": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "bind9-doc": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "liblwres90": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libisccfg90": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libisccc90": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libdns100": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libbind9-90": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "bind9-host": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "libisc95": "1:9.9.5.dfsg-3ubuntu0.19+esm1",
            "dnsutils": "1:9.9.5.dfsg-3ubuntu0.19+esm1"
        }
    ]
}