Package "dnsutils"
Name: |
dnsutils
|
Description: |
Transitional package for bind9-dnsutils
|
Latest version: |
1:9.18.39-0ubuntu0.22.04.1 |
Release: |
jammy (22.04) |
Level: |
proposed |
Repository: |
universe |
Head package: |
bind9 |
Homepage: |
https://www.isc.org/downloads/bind/ |
Links
Download "dnsutils"
Other versions of "dnsutils" in Jammy
Changelog
bind9 (1:9.18.39-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream release 9.18.39 (LP: #2112520)
- Features:
+ Add support for parsing the DSYNC record.
+ Add support for the CO flag to dig.
+ Add a new option to configure the maximum number of outgoing queries
per client request.
+ Add WALLET type.
- Updates:
+ Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1 and DS digest type 1.
+ Make TLS data processing more reliable in various network conditions.
+ Print the expiration time of the stale records.
+ Remove âwith-tuning=small/large configuration option.
+ Update built-in bind.keys file with the new 2025 IANA root key.
+ Move contributed DLZ modules into a separate repository.
+ Emit more helpful log messages for exceeding max-records-per-type.
+ Harden key management when key files have become unavailable.
+ Allow IXFR-to-AXFR fallback on DNS_R_TOOMANYRECORDS.
- Bug Fixes:
+ Fix a possible crash when adding a zone while recursing.
+ Clean enough memory when adding new ADB names/entries under memory pressure.
+ Prevent spurious validation failures.
+ Rescan the interfaces again when reconfiguring the server.
+ Fix the default interface-interval from 60s to 60m.
+ Fix purge-keys bug when using views.
+ Set name for all the isc_mem contexts.
+ Stop caching lack of EDNS support.
+ Fix resolver statistics counters for timed-out responses.
+ Donât enforce NOAUTH/NOCONF flags in DNSKEYs.
+ Fix inconsistency in CNAME/DNAME handling during resolution.
+ Fix deferred validation of unsigned DS and DNSKEY records.
+ Fix RPZ race condition during a reconfiguration.
+ Fix âCNAME and other data checkâ not being applied to all types.
+ Remove NSEC/DS/NSEC3 RRSIG check from dns_message_parse().
+ Fix rndc flushname for longer name server names.
+ Fix recently expired records sending timestamps in the future.
+ Fix YAML string not terminated in negative response in delv.
+ Apply the memory limit only to ADB database items.
+ Avoid unnecessary locking in the zone/cache database.
+ Improve the resolver performance under attack.
+ Fix nsupdate hang when processing a large update.
+ Fix possible assertion failure when reloading server while processing
update policy rules.
+ Fix dnssec-signzone signing non-DNSKEY RRsets with revoked keys.
+ Fix improper handling of unknown directives in resolv.conf.
+ Fix dig parsing of {&dns}.
+ Fix NSEC3 closest encloser lookup for names with empty non-terminals.
+ Fix display of dig options with format form [+-]option=<value>.
+ Provide more visibility into TLS configuration errors by logging
+ Fix a statistics channel counter bug when âforward onlyâ zones are
used.
+ Fix wrong address queries in the static-stub implementation.
+ Limit the outgoing UDP send queue size.
+ Do not set SO_INCOMING_CPU.
- See https://bind9.readthedocs.io/en/v9.18.39/notes.html for additional
information.
* d/p/CVE-2024-11187.patch, d/p/CVE-2024-12705.patch - Remove - fixed
upstream in 9.18.33.
* d/bind9.postinst: Perform postinst config check. (LP: #1492212)
* Clean up terminal after SIGINT call in interactive tools. (LP: #2112278)
- d/p/add-sigint-on-interactive-cleanup.patch: Run rl_reset_terminal before
SIGINT exit.
- d/rules: Link with libedit to use readline command in base library.
-- Lena Voytek <email address hidden> Thu, 21 Aug 2025 10:58:41 -0400
|
2112520 |
Backport upstream microreleases for questing cycle |
1492212 |
postinst should validate config before restarting bind |
2112278 |
shell error typing after nslookup |
CVE-2024-11187 |
Many records in the additional section cause CPU exhaustion |
CVE-2024-12705 |
DNS-over-HTTPS implementation suffers from multiple issues under heavy query load |
|
No changelog for deleted or moved packages.
|
bind9 (1:9.18.30-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream release 9.18.30 (LP: #2073310)
- Features:
+ Print initial working directory during named startup, and changed
working directory when loading or reloading the configuration file
+ Add max-query-restarts configuration statement
- Updates:
+ Restrain named to specified number of cores when running via taskset,
cpuset, or numactl
+ Reduce default max-recursion-queries value from 100 to 32
+ Raise the log level of priming failures
- Bug Fixes:
+ Fix privacy verification of EDDSA keys
+ Fix algorithm rollover bug when there are two keys with the same keytag
+ Return SERVFAIL for a too long CNAME chain
+ Reconfigure catz member zones during named reconfiguration
+ Update key lifetime and metadata after dnssec-policy reconfiguration
+ Fix generation of 6to4-self name expansion from IPv4 address
+ Fix invalid dig +yaml output
+ Reject zero-length ALPN during SVBC ALPN text parsing
+ Fix false QNAME minimisation error being reported
+ Fix dig +timeout argument when using +http
- See https://bind9.readthedocs.io/en/v9.18.30/notes.html for additional
information.
-- Lena Voytek <email address hidden> Mon, 23 Sep 2024 17:16:16 -0400
|
2073310 |
Backport of bind9 for focal, jammy and noble |
|
No changelog for deleted or moved packages.
|
bind9 (1:9.18.24-0ubuntu0.22.04.1) jammy; urgency=medium
* New upstream version 9.18.24 (LP: #2040459)
- Updates:
+ Mark use of AES as the DNS COOKIE algorithm as depricated.
+ Mark resolver-nonbackoff-tries and resolver-retry-interval statements
as depricated.
+ Update IP addresses for B.ROOT-SERVERS.NET to 170.247.170.2 and
2801:1b8:10::b.
+ Mark dnssec-must-be-secure option as deprecated.
+ Honor nsupdate -v option for SOA queries by sending both the UPDATE
request and the initial query over TCP.
+ Reduce memory consumption through dedicated jemalloc memory arenas.
- Bug fixes:
+ Fix accidental truncation to 32 bit of statistics channel counters.
+ Do not schedule unsigned versions of inline-signed zones containing
DNSSEC records for resigning.
+ Take local authoritive data into account when looking up stale data
from the cache.
+ Fix assertion failure when lock-file used at the same time as named -X.
+ Fix lockfile removal issue when starting named 3+ times.
+ Fix validation of If-Modified-Since header in statistics channel for
its length.
+ Add Content-Length header bounds check to avoid integer overflow.
+ Fix memory leaks from OpenSSL error stack.
+ Fix SERVFAIL responses after introduction of krb5-subdomain-self-rhs
and ms-subdomain-self-rhs UPDATE policies.
+ Fix accidental disable of stale-refresh-time feature on rndc flush.
+ Fix possible DNS message corruption from partial writes in TLS DNS.
- See https://bind9.readthedocs.io/en/v9.18.24/notes.html for additional
information.
* Remove CVE patches fixed upstream:
- CVE-2023-3341.patch
- CVE-2023-4236.patch
[ Fixed in 9.18.19 ]
- 0001-CVE-2023-4408.patch
- 0002-CVE-2023-5517.patch
- 0003-CVE-2023-5679.patch
- 0004-CVE-2023-50387-CVE-2023-50868.patch
[ Fixed in 9.18.24 ]
* d/p/always-use-standard-library-stdatomic.patch: Maintain use of the
standard library stdatomic.h.
-- Lena Voytek <email address hidden> Thu, 11 Apr 2024 14:11:18 -0700
|
2040459 |
MRE updates of bind9 for noble |
CVE-2023-3341 |
A stack exhaustion flaw in control channel code may cause named to terminate unexpectedly |
CVE-2023-4236 |
named may terminate unexpectedly under high DNS-over-TLS query load |
CVE-2023-4408 |
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS |
CVE-2023-5517 |
A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, |
CVE-2023-5679 |
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these |
CVE-2023-50387 |
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU |
CVE-2023-50868 |
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of se |
|
About
-
Send Feedback to @ubuntu_updates