UbuntuUpdates.org

Package "dnsutils"

Name: dnsutils

Description:

Transitional package for bind9-dnsutils

Latest version: 1:9.18.30-0ubuntu0.20.04.2
Release: focal (20.04)
Level: updates
Repository: universe
Head package: bind9
Homepage: https://www.isc.org/downloads/bind/

Links


Download "dnsutils"


Other versions of "dnsutils" in Focal

Repository Area Version
base universe 1:9.16.1-0ubuntu2
security universe 1:9.18.30-0ubuntu0.20.04.2

Changelog

Version: 1:9.16.1-0ubuntu2.15 2023-06-21 20:07:03 UTC

  bind9 (1:9.16.1-0ubuntu2.15) focal-security; urgency=medium

  * SECURITY UPDATE: Configured cache size limit can be significantly
    exceeded
    - debian/patches/CVE-2023-2828.patch: fix cache expiry in
      lib/dns/rbtdb.c.
    - CVE-2023-2828

 -- Marc Deslauriers <email address hidden> Tue, 20 Jun 2023 08:38:29 -0400

Source diff to previous version
CVE-2023-2828 named's configured cache size limit can be significantly exceeded

Version: 1:9.16.1-0ubuntu2.14 2023-03-23 17:06:53 UTC

  bind9 (1:9.16.1-0ubuntu2.14) focal; urgency=medium

  * d/bind9.named.service: restart the named service on failure.
    (LP: #2006054)

Source diff to previous version
2006054 Bind9 service file for 20.04 and older is missing Restart parameter

Version: 1:9.16.1-0ubuntu2.12 2023-01-25 20:07:04 UTC

  bind9 (1:9.16.1-0ubuntu2.12) focal-security; urgency=medium

  * SECURITY UPDATE: An UPDATE message flood may cause named to exhaust all
    available memory
    - debian/patches/CVE-2022-3094.patch: add counter in
      bin/named/bind9.xsl, bin/named/statschannel.c,
      lib/ns/include/ns/server.h, lib/ns/include/ns/stats.h,
      lib/ns/server.c, lib/ns/update.c.
    - CVE-2022-3094

 -- Marc Deslauriers <email address hidden> Tue, 24 Jan 2023 08:30:54 -0500

Source diff to previous version

Version: 1:9.16.1-0ubuntu2.11 2022-09-21 14:07:28 UTC

  bind9 (1:9.16.1-0ubuntu2.11) focal-security; urgency=medium

  * SECURITY UPDATE: Processing large delegations may severely degrade
    resolver performance
    - debian/patches/CVE-2022-2795.patch: add limit to lib/dns/resolver.c.
    - CVE-2022-2795
  * SECURITY UPDATE: memory leak in ECDSA DNSSEC verification code
    - debian/patches/CVE-2022-38177.patch: fix return handling in
      lib/dns/opensslecdsa_link.c.
    - CVE-2022-38177
  * SECURITY UPDATE: memory leaks in EdDSA DNSSEC verification code
    - debian/patches/CVE-2022-38178.patch: fix return handling in
      lib/dns/openssleddsa_link.c.
    - CVE-2022-38178

 -- Marc Deslauriers <email address hidden> Tue, 20 Sep 2022 08:05:01 -0400

Source diff to previous version
CVE-2022-2795 Processing large delegations may severely degrade resolver performance
CVE-2022-38177 Memory leak in ECDSA DNSSEC verification code
CVE-2022-38178 Memory leaks in EdDSA DNSSEC verification code

Version: 1:9.16.1-0ubuntu2.10 2022-03-17 14:06:49 UTC

  bind9 (1:9.16.1-0ubuntu2.10) focal-security; urgency=medium

  * SECURITY UPDATE: cache poisoning via bogus NS records
    - debian/patches/CVE-2021-25220.patch: tighten rules for acceptance of
      records into the cache in lib/dns/resolver.c.
    - CVE-2021-25220

 -- Marc Deslauriers <email address hidden> Tue, 15 Mar 2022 10:11:35 -0400

CVE-2021-25220 DNS forwarders - cache poisoning vulnerability



About   -   Send Feedback to @ubuntu_updates