bind9 (1:9.18.28-0ubuntu0.22.04.1) jammy-security; urgency=medium * Updated to 9.18.28 to fix multiple security issues. - CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable - CVE-2024-1737: BIND's database will be slow if a very large number of RRs exist at the same name - CVE-2024-1975: SIG(0) can be used to exhaust CPU resources - CVE-2024-4076: Assertion failure when serving both stale cache data and authoritative zone content -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 16 Jul 2024 14:16:20 -0400 bind9 (1:9.18.24-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream version 9.18.24 (LP: #2040459) - Updates: + Mark use of AES as the DNS COOKIE algorithm as depricated. + Mark resolver-nonbackoff-tries and resolver-retry-interval statements as depricated. + Update IP addresses for B.ROOT-SERVERS.NET to 170.247.170.2 and 2801:1b8:10::b. + Mark dnssec-must-be-secure option as deprecated. + Honor nsupdate -v option for SOA queries by sending both the UPDATE request and the initial query over TCP. + Reduce memory consumption through dedicated jemalloc memory arenas. - Bug fixes: + Fix accidental truncation to 32 bit of statistics channel counters. + Do not schedule unsigned versions of inline-signed zones containing DNSSEC records for resigning. + Take local authoritive data into account when looking up stale data from the cache. + Fix assertion failure when lock-file used at the same time as named -X. + Fix lockfile removal issue when starting named 3+ times. + Fix validation of If-Modified-Since header in statistics channel for its length. + Add Content-Length header bounds check to avoid integer overflow. + Fix memory leaks from OpenSSL error stack. + Fix SERVFAIL responses after introduction of krb5-subdomain-self-rhs and ms-subdomain-self-rhs UPDATE policies. + Fix accidental disable of stale-refresh-time feature on rndc flush. + Fix possible DNS message corruption from partial writes in TLS DNS. - See https://bind9.readthedocs.io/en/v9.18.24/notes.html for additional information. * Remove CVE patches fixed upstream: - CVE-2023-3341.patch - CVE-2023-4236.patch [ Fixed in 9.18.19 ] - 0001-CVE-2023-4408.patch - 0002-CVE-2023-5517.patch - 0003-CVE-2023-5679.patch - 0004-CVE-2023-50387-CVE-2023-50868.patch [ Fixed in 9.18.24 ] * d/p/always-use-standard-library-stdatomic.patch: Maintain use of the standard library stdatomic.h. -- Lena Voytek <lena.voytek@canonical.com> Thu, 11 Apr 2024 14:11:18 -0700 bind9 (1:9.18.18-0ubuntu0.22.04.2) jammy-security; urgency=medium * SECURITY UPDATE: Multiple security issues - debian/patches/0001-CVE-2023-4408.patch: Parsing large DNS messages may cause excessive CPU load. - debian/patches/0002-CVE-2023-5517.patch: Querying RFC 1918 reverse zones may cause an assertion failure when nxdomain-redirect is enabled. - debian/patches/0003-CVE-2023-5679.patch: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution. - debian/patches/0004-CVE-2023-50387-CVE-2023-50868.patch: Extreme CPU consumption in DNSSEC validator and Preparing an NSEC3 closest encloser proof can exhaust CPU resources. - CVE-2023-4408 - CVE-2023-5517 - CVE-2023-5679 - CVE-2023-50387 - CVE-2023-50868 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 12 Feb 2024 14:29:56 -0500 bind9 (1:9.18.18-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream release 9.18.18 (LP: #2028413) - Updates: + Mark a primary server as temporarily unreachable when a TCP connection response to an SOA query times out, matching behavior of a refused TCP connection. + Mark dialup and heartbeat-interval options as deprecated. + Retry DNS queries without an EDNS COOKIE when the first response is FORMERR with the EDNS COOKIE that was sent originally. + Use NS records for the relaxed QNAME minimization mode to reduce the number of queries from named. + Mark TKEY mode 2 as deprecated. + Mark delegation-only and root-delegation-only as deprecated. + Run RPZ and catalog zone updates on specialized offload threads to reduce blocked query processing time. - Bug Fixes: + Fix assertion failure from processing already-queued queries while server is being reconfigured or cache is being flushed. + Fix failure to load zones containing resource records with a TTL value larger than 86400 seconds when dnssec-policy is set to insecure. + Fix the ability to read HMAC-MD5 key files (LP: #2015176). + Fix stability issues with the catalog zone implementation. + Fix bind9 getting stuck when listen-on statement for HTTP is removed from configuration. + Do not return delegation from cache after stale-answer-client-timeout. + Fix failure to auto-tune clients-per-query limit in some situations. + Fix proper timeouts when using max-transfer-time-in and max-transfer-idle-in statements. + Bring rndc read timeout back to 60 seconds from 30. + Treat libuv returning ISC_R_INVALIDPROTO as a network error. + Clean up empty-non-terminal NSEC3 records. + Fix log file rotation cleanup for absolute file path destinations. + Fix various catalog zone processing crashes. + Fix transfer hang when downloading large zones over TLS. + Fix named crash when adding a new zone into the configuration file for a name which was already configured as member zone for a catalog zone. + Delay DNSSEC key queries until all zones have finished loading. - See https://bind9.readthedocs.io/en/v9.18.18/notes.html for additional information. * d/p/CVE-2023-2828.patch, CVE-2023-2911.patch: Remove - fixed upstream in 9.18.16. * d/p/CVE-2023-3341.patch: Refresh, matching upstream, to apply in 9.18.18. * d/t/control, d/t/dyndb-ldap: add DEP8 test (LP: #2032650) -- Lena Voytek <lena.voytek@canonical.com> Wed, 20 Sep 2023 15:15:41 -0700 bind9 (1:9.18.12-0ubuntu0.22.04.3) jammy-security; urgency=medium * SECURITY UPDATE: DoS via recusive packet parsing - debian/patches/CVE-2023-3341.patch: add a max depth check to lib/isc/include/isc/result.h, lib/isc/result.c, lib/isccc/cc.c. - CVE-2023-3341 * SECURITY UPDATE: Dos via DNS-over-TLS queries - debian/patches/CVE-2023-4236.patch: check return code in lib/isc/netmgr/tlsdns.c. - CVE-2023-4236 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 19 Sep 2023 07:21:46 -0400 bind9 (1:9.18.12-0ubuntu0.22.04.2) jammy-security; urgency=medium * SECURITY UPDATE: Configured cache size limit can be significantly exceeded - debian/patches/CVE-2023-2828.patch: fix cache expiry in lib/dns/rbtdb.c. - CVE-2023-2828 * SECURITY UPDATE: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0 - debian/patches/CVE-2023-2911.patch: fix refreshing queries in lib/ns/query.c. - CVE-2023-2911 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 20 Jun 2023 08:29:34 -0400 bind9 (1:9.18.12-0ubuntu0.22.04.1) jammy; urgency=medium * New upstream releases 9.18.2 - 9.18.12 (LP: #2003586) - Updates: + update-quota option + named -V shows supported cryptographic algorithms + Catalog Zones schema version 2 support in named + DNS error support Stale Answer and Stale NXDOMAIN Answer + Remote TLS certificate verification support + reusereport option - Bug Fixes Include: + Fix crash when using dig with +nssearch and +tcp (LP: #1258003) + Fix incomplete results using dig with +nssearch (LP: #1970252) + Fix loading of preinstalled plugins (LP: #2006972) + CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38178, CVE-2022-3094, CVE-2022-3736, CVE-2022-3924, CVE-2022-1183 + Fix thread safety in dns_dispatch + Fix ADB quota management in resolver + Fix Prohibited DNS error on allow-recursion + Fix crash when restarting server with active statschannel connection + Fix use after free for catalog zone processing + Fix leak of dns_keyfileio_t objects + Fix nslookup failure to use port option when record type ANY is used + Fix crash on dnssec-policy zone with NSEC3 and inline-signing turned on + Fix inheritance when setting remote server port + Fix assertion error when accessing statistics channel + Fix rndc dumpdb -expired for stuck cache + Fix check for other name servers after receiving FORMERR + Fix deletion of CDS after zone sign + Fix dighost query context management + Fix dig hanging due to IPv4 mapped IPv6 address + See https://bind9.readthedocs.io/en/v9_18_12/notes.html#notes-for-bind-9-18-12 for additional bug fixes and information * Improve dep-8 test suite (LP: #2003584): - d/t/zonetest: Add dep8 test for checking the domain zone creation process - d/t/control: Add new test outline * d/bind9-doc.docs: Stop installing removed file doc/misc/options.active * Remove patches for bugs LP #1964400 and LP #1964686 fixed upstream: - lp1964400-lp1964686-Fix-an-issue-in-dig-when-retrying-with-the-next-serv - lp1964400-lp1964686-When-resending-a-UDP-request-insert-the-query-to-the - lp1964400-lp1964686-Add-digdelv-system-test-to-check-timed-out-result-fo - lp1964400-lp1964686-After-dig-request-errors-try-to-use-other-servers-wh - lp1964400-lp1964686-Add-digdelv-system-test-to-check-that-dig-tries-othe - lp1964400-lp1964686-Fix-dig-error-when-trying-the-next-server-after-a-TC - lp1964400-lp1964686-Add-various-dig-host-tests-for-TCP-UDP-socket-error- * Remove CVE patches fixed upstream: - debian/patches/CVE-2022-1183.patch [Included in upstream release 9.18.3] - debian/patches/CVE-2022-2795.patch - debian/patches/CVE-2022-2881.patch - debian/patches/CVE-2022-2906.patch - debian/patches/CVE-2022-3080.patch - debian/patches/CVE-2022-38178.patch [Included in upstream release 9.18.7] - debian/patches/CVE-2022-3094.patch - debian/patches/CVE-2022-3736.patch - debian/patches/CVE-2022-3924.patch [Included in upstream release 9.18.11] -- Lena Voytek <lena.voytek@canonical.com> Wed, 08 Mar 2023 12:08:55 -0700 bind9 (1:9.18.1-1ubuntu1.3) jammy-security; urgency=medium * SECURITY UPDATE: An UPDATE message flood may cause named to exhaust all available memory - debian/patches/CVE-2022-3094.patch: add counter in bin/named/bind9.xsl, bin/named/statschannel.c, doc/arm/reference.rst, lib/ns/include/ns/server.h, lib/ns/include/ns/stats.h, lib/ns/server.c, lib/ns/update.c. - CVE-2022-3094 * SECURITY UPDATE: named configured to answer from stale cache may terminate unexpectedly while processing RRSIG queries - debian/patches/CVE-2022-3736.patch: fix logic in lib/ns/query.c. - CVE-2022-3736 * SECURITY UPDATE: named configured to answer from stale cache may terminate unexpectedly at recursive-clients soft quota - debian/patches/CVE-2022-3924.patch: improve logic in lib/dns/resolver.c, lib/ns/query.c. - CVE-2022-3924 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 24 Jan 2023 08:18:53 -0500 bind9 (1:9.18.1-1ubuntu1.2) jammy-security; urgency=medium * SECURITY UPDATE: Processing large delegations may severely degrade resolver performance - debian/patches/CVE-2022-2795.patch: add limit to lib/dns/resolver.c. - CVE-2022-2795 * SECURITY UPDATE: Buffer overread in statistics channel code - debian/patches/CVE-2022-2881.patch: clear buffer in lib/isc/httpd.c. - CVE-2022-2881 * SECURITY UPDATE: Memory leaks in code handling Diffie-Hellman key exchange via TKEY RRs - debian/patches/CVE-2022-2906.patch: adjust return code handling in lib/dns/openssldh_link.c. - CVE-2022-2906 * SECURITY UPDATE: resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly - debian/patches/CVE-2022-3080.patch: refactor stale RRset handling in lib/ns/include/ns/query.h, lib/ns/query.c. - CVE-2022-3080 * SECURITY UPDATE: memory leaks in EdDSA DNSSEC verification code - debian/patches/CVE-2022-38178.patch: fix return handling in lib/dns/openssleddsa_link.c. - CVE-2022-38178 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 20 Sep 2022 07:51:26 -0400 bind9 (1:9.18.1-1ubuntu1.1) jammy-security; urgency=medium * SECURITY UPDATE: Destroying a TLS session early causes assertion failure - debian/patches/CVE-2022-1183.patch: fix destroying logic in lib/isc/netmgr/netmgr-int.h, lib/isc/netmgr/tlsstream.c. - CVE-2022-1183 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 17 May 2022 07:38:24 -0400 # For older changelog entries, run 'apt-get changelog bind9-libs'
Generated by dwww version 1.14 on Thu Jan 23 03:31:18 CET 2025.