bind9 (1:9.18.30-0ubuntu0.22.04.2) jammy-security; urgency=medium * SECURITY UPDATE: Many records in the additional section cause CPU exhaustion - debian/patches/CVE-2024-11187.patch: limit the additional processing for large RDATA sets in bin/tests/*, lib/dns/include/dns/rdataset.h, lib/dns/rbtdb.c, lib/dns/rdataset.c, lib/dns/resolver.c, lib/ns/query.c. - CVE-2024-11187 * SECURITY UPDATE: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load - debian/patches/CVE-2024-12705.patch: fix flooding issues in lib/isc/netmgr/http.c, lib/isc/netmgr/netmgr-int.h, lib/isc/netmgr/netmgr.c, lib/isc/netmgr/tcp.c, lib/isc/netmgr/tlsstream.c. - CVE-2024-12705 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 28 Jan 2025 09:30:35 -0500 bind9 (1:9.18.30-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream release 9.18.30 (LP: #2073310) - Features: + Print initial working directory during named startup, and changed working directory when loading or reloading the configuration file + Add max-query-restarts configuration statement - Updates: + Restrain named to specified number of cores when running via taskset, cpuset, or numactl + Reduce default max-recursion-queries value from 100 to 32 + Raise the log level of priming failures - Bug Fixes: + Fix privacy verification of EDDSA keys + Fix algorithm rollover bug when there are two keys with the same keytag + Return SERVFAIL for a too long CNAME chain + Reconfigure catz member zones during named reconfiguration + Update key lifetime and metadata after dnssec-policy reconfiguration + Fix generation of 6to4-self name expansion from IPv4 address + Fix invalid dig +yaml output + Reject zero-length ALPN during SVBC ALPN text parsing + Fix false QNAME minimisation error being reported + Fix dig +timeout argument when using +http - See https://bind9.readthedocs.io/en/v9.18.30/notes.html for additional information. -- Lena Voytek <lena.voytek@canonical.com> Mon, 23 Sep 2024 17:16:16 -0400 bind9 (1:9.18.28-0ubuntu0.22.04.1) jammy-security; urgency=medium * Updated to 9.18.28 to fix multiple security issues. - CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable - CVE-2024-1737: BIND's database will be slow if a very large number of RRs exist at the same name - CVE-2024-1975: SIG(0) can be used to exhaust CPU resources - CVE-2024-4076: Assertion failure when serving both stale cache data and authoritative zone content -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 16 Jul 2024 14:16:20 -0400 bind9 (1:9.18.24-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream version 9.18.24 (LP: #2040459) - Updates: + Mark use of AES as the DNS COOKIE algorithm as depricated. + Mark resolver-nonbackoff-tries and resolver-retry-interval statements as depricated. + Update IP addresses for B.ROOT-SERVERS.NET to 170.247.170.2 and 2801:1b8:10::b. + Mark dnssec-must-be-secure option as deprecated. + Honor nsupdate -v option for SOA queries by sending both the UPDATE request and the initial query over TCP. + Reduce memory consumption through dedicated jemalloc memory arenas. - Bug fixes: + Fix accidental truncation to 32 bit of statistics channel counters. + Do not schedule unsigned versions of inline-signed zones containing DNSSEC records for resigning. + Take local authoritive data into account when looking up stale data from the cache. + Fix assertion failure when lock-file used at the same time as named -X. + Fix lockfile removal issue when starting named 3+ times. + Fix validation of If-Modified-Since header in statistics channel for its length. + Add Content-Length header bounds check to avoid integer overflow. + Fix memory leaks from OpenSSL error stack. + Fix SERVFAIL responses after introduction of krb5-subdomain-self-rhs and ms-subdomain-self-rhs UPDATE policies. + Fix accidental disable of stale-refresh-time feature on rndc flush. + Fix possible DNS message corruption from partial writes in TLS DNS. - See https://bind9.readthedocs.io/en/v9.18.24/notes.html for additional information. * Remove CVE patches fixed upstream: - CVE-2023-3341.patch - CVE-2023-4236.patch [ Fixed in 9.18.19 ] - 0001-CVE-2023-4408.patch - 0002-CVE-2023-5517.patch - 0003-CVE-2023-5679.patch - 0004-CVE-2023-50387-CVE-2023-50868.patch [ Fixed in 9.18.24 ] * d/p/always-use-standard-library-stdatomic.patch: Maintain use of the standard library stdatomic.h. -- Lena Voytek <lena.voytek@canonical.com> Thu, 11 Apr 2024 14:11:18 -0700 bind9 (1:9.18.18-0ubuntu0.22.04.2) jammy-security; urgency=medium * SECURITY UPDATE: Multiple security issues - debian/patches/0001-CVE-2023-4408.patch: Parsing large DNS messages may cause excessive CPU load. - debian/patches/0002-CVE-2023-5517.patch: Querying RFC 1918 reverse zones may cause an assertion failure when nxdomain-redirect is enabled. - debian/patches/0003-CVE-2023-5679.patch: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution. - debian/patches/0004-CVE-2023-50387-CVE-2023-50868.patch: Extreme CPU consumption in DNSSEC validator and Preparing an NSEC3 closest encloser proof can exhaust CPU resources. - CVE-2023-4408 - CVE-2023-5517 - CVE-2023-5679 - CVE-2023-50387 - CVE-2023-50868 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 12 Feb 2024 14:29:56 -0500 bind9 (1:9.18.18-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream release 9.18.18 (LP: #2028413) - Updates: + Mark a primary server as temporarily unreachable when a TCP connection response to an SOA query times out, matching behavior of a refused TCP connection. + Mark dialup and heartbeat-interval options as deprecated. + Retry DNS queries without an EDNS COOKIE when the first response is FORMERR with the EDNS COOKIE that was sent originally. + Use NS records for the relaxed QNAME minimization mode to reduce the number of queries from named. + Mark TKEY mode 2 as deprecated. + Mark delegation-only and root-delegation-only as deprecated. + Run RPZ and catalog zone updates on specialized offload threads to reduce blocked query processing time. - Bug Fixes: + Fix assertion failure from processing already-queued queries while server is being reconfigured or cache is being flushed. + Fix failure to load zones containing resource records with a TTL value larger than 86400 seconds when dnssec-policy is set to insecure. + Fix the ability to read HMAC-MD5 key files (LP: #2015176). + Fix stability issues with the catalog zone implementation. + Fix bind9 getting stuck when listen-on statement for HTTP is removed from configuration. + Do not return delegation from cache after stale-answer-client-timeout. + Fix failure to auto-tune clients-per-query limit in some situations. + Fix proper timeouts when using max-transfer-time-in and max-transfer-idle-in statements. + Bring rndc read timeout back to 60 seconds from 30. + Treat libuv returning ISC_R_INVALIDPROTO as a network error. + Clean up empty-non-terminal NSEC3 records. + Fix log file rotation cleanup for absolute file path destinations. + Fix various catalog zone processing crashes. + Fix transfer hang when downloading large zones over TLS. + Fix named crash when adding a new zone into the configuration file for a name which was already configured as member zone for a catalog zone. + Delay DNSSEC key queries until all zones have finished loading. - See https://bind9.readthedocs.io/en/v9.18.18/notes.html for additional information. * d/p/CVE-2023-2828.patch, CVE-2023-2911.patch: Remove - fixed upstream in 9.18.16. * d/p/CVE-2023-3341.patch: Refresh, matching upstream, to apply in 9.18.18. * d/t/control, d/t/dyndb-ldap: add DEP8 test (LP: #2032650) -- Lena Voytek <lena.voytek@canonical.com> Wed, 20 Sep 2023 15:15:41 -0700 bind9 (1:9.18.12-0ubuntu0.22.04.3) jammy-security; urgency=medium * SECURITY UPDATE: DoS via recusive packet parsing - debian/patches/CVE-2023-3341.patch: add a max depth check to lib/isc/include/isc/result.h, lib/isc/result.c, lib/isccc/cc.c. - CVE-2023-3341 * SECURITY UPDATE: Dos via DNS-over-TLS queries - debian/patches/CVE-2023-4236.patch: check return code in lib/isc/netmgr/tlsdns.c. - CVE-2023-4236 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 19 Sep 2023 07:21:46 -0400 bind9 (1:9.18.12-0ubuntu0.22.04.2) jammy-security; urgency=medium * SECURITY UPDATE: Configured cache size limit can be significantly exceeded - debian/patches/CVE-2023-2828.patch: fix cache expiry in lib/dns/rbtdb.c. - CVE-2023-2828 * SECURITY UPDATE: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0 - debian/patches/CVE-2023-2911.patch: fix refreshing queries in lib/ns/query.c. - CVE-2023-2911 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 20 Jun 2023 08:29:34 -0400 bind9 (1:9.18.12-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream releases 9.18.2 - 9.18.12 (LP: #2003586) - Updates: + update-quota option + named -V shows supported cryptographic algorithms + Catalog Zones schema version 2 support in named + DNS error support Stale Answer and Stale NXDOMAIN Answer + Remote TLS certificate verification support + reusereport option - Bug Fixes Include: + Fix crash when using dig with +nssearch and +tcp (LP: #1258003) + Fix incomplete results using dig with +nssearch (LP: #1970252) + Fix loading of preinstalled plugins (LP: #2006972) + CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38178, CVE-2022-3094, CVE-2022-3736, CVE-2022-3924, CVE-2022-1183 + Fix thread safety in dns_dispatch + Fix ADB quota management in resolver + Fix Prohibited DNS error on allow-recursion + Fix crash when restarting server with active statschannel connection + Fix use after free for catalog zone processing + Fix leak of dns_keyfileio_t objects + Fix nslookup failure to use port option when record type ANY is used + Fix crash on dnssec-policy zone with NSEC3 and inline-signing turned on + Fix inheritance when setting remote server port + Fix assertion error when accessing statistics channel + Fix rndc dumpdb -expired for stuck cache + Fix check for other name servers after receiving FORMERR + Fix deletion of CDS after zone sign + Fix dighost query context management + Fix dig hanging due to IPv4 mapped IPv6 address + See https://bind9.readthedocs.io/en/v9_18_12/notes.html#notes-for-bind-9-18-12 for additional bug fixes and information * Improve dep-8 test suite (LP: #2003584): - d/t/zonetest: Add dep8 test for checking the domain zone creation process - d/t/control: Add new test outline * d/bind9-doc.docs: Stop installing removed file doc/misc/options.active * Remove patches for bugs LP #1964400 and LP #1964686 fixed upstream: - lp1964400-lp1964686-Fix-an-issue-in-dig-when-retrying-with-the-next-serv - lp1964400-lp1964686-When-resending-a-UDP-request-insert-the-query-to-the - lp1964400-lp1964686-Add-digdelv-system-test-to-check-timed-out-result-fo - lp1964400-lp1964686-After-dig-request-errors-try-to-use-other-servers-wh - lp1964400-lp1964686-Add-digdelv-system-test-to-check-that-dig-tries-othe - lp1964400-lp1964686-Fix-dig-error-when-trying-the-next-server-after-a-TC - lp1964400-lp1964686-Add-various-dig-host-tests-for-TCP-UDP-socket-error- * Remove CVE patches fixed upstream: - debian/patches/CVE-2022-1183.patch [Included in upstream release 9.18.3] - debian/patches/CVE-2022-2795.patch - debian/patches/CVE-2022-2881.patch - debian/patches/CVE-2022-2906.patch - debian/patches/CVE-2022-3080.patch - debian/patches/CVE-2022-38178.patch [Included in upstream release 9.18.7] - debian/patches/CVE-2022-3094.patch - debian/patches/CVE-2022-3736.patch - debian/patches/CVE-2022-3924.patch [Included in upstream release 9.18.11] -- Lena Voytek <lena.voytek@canonical.com> Wed, 08 Mar 2023 12:08:55 -0700 bind9 (1:9.18.1-1ubuntu1.3) jammy-security; urgency=medium * SECURITY UPDATE: An UPDATE message flood may cause named to exhaust all available memory - debian/patches/CVE-2022-3094.patch: add counter in bin/named/bind9.xsl, bin/named/statschannel.c, doc/arm/reference.rst, lib/ns/include/ns/server.h, lib/ns/include/ns/stats.h, lib/ns/server.c, lib/ns/update.c. - CVE-2022-3094 * SECURITY UPDATE: named configured to answer from stale cache may terminate unexpectedly while processing RRSIG queries - debian/patches/CVE-2022-3736.patch: fix logic in lib/ns/query.c. - CVE-2022-3736 * SECURITY UPDATE: named configured to answer from stale cache may terminate unexpectedly at recursive-clients soft quota - debian/patches/CVE-2022-3924.patch: improve logic in lib/dns/resolver.c, lib/ns/query.c. - CVE-2022-3924 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 24 Jan 2023 08:18:53 -0500 # For older changelog entries, run 'apt-get changelog bind9-doc'
Generated by dwww version 1.14 on Sun Feb 2 13:40:07 CET 2025.