Package "bind9"
Name: |
bind9
|
Description: |
Internet Domain Name Server
|
Latest version: |
1:9.18.28-0ubuntu0.20.04.1 |
Release: |
focal (20.04) |
Level: |
security |
Repository: |
main |
Homepage: |
https://www.isc.org/downloads/bind/ |
Links
Download "bind9"
Other versions of "bind9" in Focal
Packages in group
Deleted packages are displayed in grey.
Changelog
bind9 (1:9.18.28-0ubuntu0.20.04.1) focal-security; urgency=medium
* Updated to 9.18.28 to fix multiple security issues.
- Please see the following for a list of changes, including possibly
incompatible ones:
https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918
- CVE-2024-0760: A flood of DNS messages over TCP may make the server
unstable
- CVE-2024-1737: BIND's database will be slow if a very large number of
RRs exist at the same name
- CVE-2024-1975: SIG(0) can be used to exhaust CPU resources
- CVE-2024-4076: Assertion failure when serving both stale cache data
and authoritative zone content
* Packaging changes required for 9.18.28:
- Dropped patches no longer required with 9.18.28:
+ 0001-Add_--install-layout=deb_to_setup.py_call.patch
+ 0002-python-fix-for-dist-packages.patch
+ 0003-Remove-the-reference-to-OPTIONS.md-it-breaks-build-o.patch
- Synced patch with jammy's 1:9.18.28-0ubuntu0.22.04.1 package:
+ always-use-standard-library-stdatomic.patch
- debian/NEWS: list changes in 9.18, taken from jammy.
- debian/*: sync most of the packaging with jammy's package, including
autopkgtests except for dyndb-ldap as the bind-dyndb-ldap package is
broken in focal.
- debian/tests/simpletest: wait a couple of seconds for the service to
actually start.
-- Marc Deslauriers <email address hidden> Tue, 16 Jul 2024 14:48:12 -0400
|
Source diff to previous version |
bind9 (1:9.16.48-0ubuntu0.20.04.1) focal-security; urgency=medium
* Updated to 9.16.48 to fix multiple security issues.
- Please see the following for a list of changes, including possibly
incompatible ones:
https://downloads.isc.org/isc/bind9/9.16.48/doc/arm/html/notes.html
- CVE-2023-4408
- CVE-2023-5517
- CVE-2023-6516
- CVE-2023-50387
- CVE-2023-50868
* Packaging changes required for 9.16.48:
- Dropped patches no longer required with 9.16.48:
+ CVE-*.patch
+ fix-rebinding-protection.patch,
+ 0003-Print-diagnostics-on-dns_name_issubdomain-failure-in.patch
+ lp-1909950-fix-race-between-deactivating-handle-async-callback.patch
+ lp1997375-segfault-isc-nm-tcp-send.patch
- Synced other patches with Debian's 1:9.16.48-1 package
- debian/*.install, debian/*.links: updated with new files in 9.16.48.
- debian/rules, debian/not-installed: don't delete old -dev files, just
don't install them.
- debian/control, debian/rules: switch packages required to build
documentation.
-- Marc Deslauriers <email address hidden> Wed, 14 Feb 2024 07:49:14 -0500
|
Source diff to previous version |
CVE-2023-4408 |
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS |
CVE-2023-5517 |
A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, |
CVE-2023-6516 |
To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods |
CVE-2023-50387 |
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU |
CVE-2023-50868 |
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of se |
|
bind9 (1:9.16.1-0ubuntu2.16) focal-security; urgency=medium
* SECURITY UPDATE: DoS via recusive packet parsing
- debian/patches/CVE-2023-3341.patch: add a max depth check to
lib/isccc/include/isccc/result.h, lib/isccc/result.c, lib/isccc/cc.c.
- CVE-2023-3341
-- Marc Deslauriers <email address hidden> Tue, 19 Sep 2023 07:22:19 -0400
|
Source diff to previous version |
CVE-2023-3341 |
A stack exhaustion flaw in control channel code may cause named to terminate unexpectedly |
|
bind9 (1:9.16.1-0ubuntu2.15) focal-security; urgency=medium
* SECURITY UPDATE: Configured cache size limit can be significantly
exceeded
- debian/patches/CVE-2023-2828.patch: fix cache expiry in
lib/dns/rbtdb.c.
- CVE-2023-2828
-- Marc Deslauriers <email address hidden> Tue, 20 Jun 2023 08:38:29 -0400
|
Source diff to previous version |
CVE-2023-2828 |
named's configured cache size limit can be significantly exceeded |
|
bind9 (1:9.16.1-0ubuntu2.12) focal-security; urgency=medium
* SECURITY UPDATE: An UPDATE message flood may cause named to exhaust all
available memory
- debian/patches/CVE-2022-3094.patch: add counter in
bin/named/bind9.xsl, bin/named/statschannel.c,
lib/ns/include/ns/server.h, lib/ns/include/ns/stats.h,
lib/ns/server.c, lib/ns/update.c.
- CVE-2022-3094
-- Marc Deslauriers <email address hidden> Tue, 24 Jan 2023 08:30:54 -0500
|
About
-
Send Feedback to @ubuntu_updates