I have received below vulnerabilities advisory in my ubuntu 20 servers installed with bind9. existing version is - BIND 9.16.1-Ubuntu (Stable Release) and upgrade it to the latest. latest bind9 in ubuntu 20 is the same. Any thoughts and updates ?
CVE ID | Vulnerability Name | Affected Products |
---|---|---|
CVE-2021-25220 | DNS forwarders - cache poisoning vulnerability | BIND 9.11.0 -> 9.11.36; 9.12.0 -> 9.16.26; 9.17.0 -> 9.18.0; BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 |
CVE-2022-0396 | DoS from specifically crafted TCP packets | BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition |
CVE-2022-0635 | DNAME insist with synth-from-dnssec enabled | BIND 9.18.0 |
CVE-2022-0667 | Assertion failure on delayed DS lookup | BIND 9.18.0 |