{"id":"USN-6909-1","summary":"bind9 vulnerabilities","details":"It was discovered that Bind incorrectly handled a flood of DNS messages\nover TCP. A remote attacker could possibly use this issue to cause Bind to\nbecome unstable, resulting in a denial of service. (CVE-2024-0760)\n\nToshifumi Sakaguchi discovered that Bind incorrectly handled having a very\nlarge number of RRs existing at the same time. A remote attacker could\npossibly use this issue to cause Bind to consume resources, leading to a\ndenial of service. (CVE-2024-1737)\n\nIt was discovered that Bind incorrectly handled a large number of SIG(0)\nsigned requests. A remote attacker could possibly use this issue to cause\nBind to consume resources, leading to a denial of service. (CVE-2024-1975)\n\nDaniel Stränger discovered that Bind incorrectly handled serving both\nstable cache data and authoritative zone content. A remote attacker could\npossibly use this issue to cause Bind to crash, resulting in a denial of\nservice. (CVE-2024-4076)\n\nOn Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition\nto security fixes, the updated packages contain bug fixes, new features,\nand possibly incompatible changes.\n\nPlease see the following for more information:\n\nhttps://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918\n","modified":"2026-02-10T04:44:41Z","published":"2024-07-23T14:19:48Z","related":["UBUNTU-CVE-2024-0760","UBUNTU-CVE-2024-1737","UBUNTU-CVE-2024-1975","UBUNTU-CVE-2024-4076"],"upstream":["CVE-2024-0760","CVE-2024-1737","CVE-2024-1975","CVE-2024-4076","UBUNTU-CVE-2024-0760","UBUNTU-CVE-2024-1737","UBUNTU-CVE-2024-1975","UBUNTU-CVE-2024-4076"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6909-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0760"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1737"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1975"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-4076"}],"affected":[{"package":{"name":"bind9","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/bind9@1:9.18.28-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:9.18.28-0ubuntu0.20.04.1"}]}],"versions":["1:9.11.5.P4+dfsg-5.1ubuntu2","1:9.11.5.P4+dfsg-5.1ubuntu3","1:9.11.5.P4+dfsg-5.1ubuntu4","1:9.11.5.P4+dfsg-5.1ubuntu5","1:9.11.14+dfsg-1ubuntu1","1:9.11.14+dfsg-3ubuntu1","1:9.16.0-1ubuntu3","1:9.16.0-1ubuntu4","1:9.16.0-1ubuntu5","1:9.16.1-0ubuntu1","1:9.16.1-0ubuntu2","1:9.16.1-0ubuntu2.1","1:9.16.1-0ubuntu2.2","1:9.16.1-0ubuntu2.3","1:9.16.1-0ubuntu2.4","1:9.16.1-0ubuntu2.6","1:9.16.1-0ubuntu2.7","1:9.16.1-0ubuntu2.8","1:9.16.1-0ubuntu2.9","1:9.16.1-0ubuntu2.10","1:9.16.1-0ubuntu2.11","1:9.16.1-0ubuntu2.12","1:9.16.1-0ubuntu2.14","1:9.16.1-0ubuntu2.15","1:9.16.1-0ubuntu2.16","1:9.16.48-0ubuntu0.20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9-dnsutils"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9-host"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9-libs"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9-utils"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"bind9utils"},{"binary_version":"1:9.18.28-0ubuntu0.20.04.1","binary_name":"dnsutils"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-0760","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1737","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1975","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-4076","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6909-1.json"}},{"package":{"name":"bind9","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/bind9@1:9.18.28-0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:9.18.28-0ubuntu0.22.04.1"}]}],"versions":["1:9.16.15-1ubuntu1","1:9.16.15-1ubuntu2","1:9.16.15-1ubuntu3","1:9.18.0-2ubuntu1","1:9.18.0-2ubuntu2","1:9.18.0-2ubuntu3","1:9.18.1-1ubuntu1","1:9.18.1-1ubuntu1.1","1:9.18.1-1ubuntu1.2","1:9.18.1-1ubuntu1.3","1:9.18.12-0ubuntu0.22.04.1","1:9.18.12-0ubuntu0.22.04.2","1:9.18.12-0ubuntu0.22.04.3","1:9.18.18-0ubuntu0.22.04.1","1:9.18.18-0ubuntu0.22.04.2","1:9.18.24-0ubuntu0.22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9-dev"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9-dnsutils"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9-host"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9-libs"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9-utils"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"bind9utils"},{"binary_version":"1:9.18.28-0ubuntu0.22.04.1","binary_name":"dnsutils"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-0760","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1737","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1975","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-4076","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6909-1.json"}},{"package":{"name":"bind9","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/bind9@1:9.18.28-0ubuntu0.24.04.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:9.18.28-0ubuntu0.24.04.1"}]}],"versions":["1:9.18.18-0ubuntu2","1:9.18.21-0ubuntu1","1:9.18.24-0ubuntu3","1:9.18.24-0ubuntu4","1:9.18.24-0ubuntu5"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9-dev"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9-dnsutils"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9-host"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9-libs"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9-utils"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"bind9utils"},{"binary_version":"1:9.18.28-0ubuntu0.24.04.1","binary_name":"dnsutils"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-0760","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1737","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1975","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-4076","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6909-1.json"}}],"schema_version":"1.7.3"}