Package "libisccfg160"

Name: libisccfg160


Config File Handling Library used by BIND

Latest version: 1:9.11.3+dfsg-1ubuntu1.11
Release: bionic (18.04)
Level: updates
Repository: main
Head package: bind9
Homepage: https://www.isc.org/downloads/bind/


Save this URL for the latest version of "libisccfg160": https://www.ubuntuupdates.org/libisccfg160

Download "libisccfg160"

Other versions of "libisccfg160" in Bionic

Repository Area Version
security main 1:9.11.3+dfsg-1ubuntu1.11


Version: 1:9.11.3+dfsg-1ubuntu1.11 2019-11-21 16:07:08 UTC

  bind9 (1:9.11.3+dfsg-1ubuntu1.11) bionic-security; urgency=medium

  * SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single
    - debian/patches/CVE-2019-6477.patch: limit number of clients in
      bin/named/client.c, bin/named/include/named/client.h.
    - CVE-2019-6477

 -- Marc Deslauriers <email address hidden> Mon, 18 Nov 2019 10:01:47 -0500

Source diff to previous version
CVE-2019-6477 TCP-pipelined queries can bypass tcp-clients limit

Version: 1:9.11.3+dfsg-1ubuntu1.10 2019-11-06 17:06:22 UTC

  bind9 (1:9.11.3+dfsg-1ubuntu1.10) bionic; urgency=medium

  * d/p/fix-socket-failures-during-name-resolution.patch: fix socket failures
    due to uninitialized memory during name resolution (LP: #1804542)

 -- Lucas Kanashiro <email address hidden> Mon, 30 Sep 2019 15:39:12 -0300

Source diff to previous version
1804542 [SRU] Multiple intermittent socket failures during name resolutions

Version: 1:9.11.3+dfsg-1ubuntu1.9 2019-09-02 11:07:03 UTC

  bind9 (1:9.11.3+dfsg-1ubuntu1.9) bionic; urgency=medium

  * d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
    close to a query timeout (LP: #1797926)

 -- Christian Ehrhardt <email address hidden> Wed, 07 Aug 2019 16:43:40 +0200

Source diff to previous version
1797926 host crashed with SIGABRT in isc_assertion_failed()

Version: 1:9.11.3+dfsg-1ubuntu1.8 2019-06-20 13:08:00 UTC

  bind9 (1:9.11.3+dfsg-1ubuntu1.8) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS via malformed packets
    - debian/patches/CVE-2019-6471.patch: fix race condition in
    - CVE-2019-6471

 -- Marc Deslauriers <email address hidden> Tue, 18 Jun 2019 18:55:08 -0400

Source diff to previous version
CVE-2019-6471 A race condition when discarding malformed packets can cause BIND to exit with an assertion failure

Version: 1:9.11.3+dfsg-1ubuntu1.7 2019-04-25 16:07:11 UTC

  bind9 (1:9.11.3+dfsg-1ubuntu1.7) bionic-security; urgency=medium

  * SECURITY UPDATE: limiting simultaneous TCP clients is ineffective
    - debian/patches/CVE-2018-5743.patch: add reference counting in
      bin/named/client.c, bin/named/include/named/client.h,
      bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c,
      lib/isc/include/isc/quota.h, lib/isc/quota.c,
    - debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic
      operations with isc_refcount reference counting in
      bin/named/client.c, bin/named/include/named/interfacemgr.h,
    - debian/libisc169.symbols: added new symbols.
    - CVE-2018-5743

 -- Marc Deslauriers <email address hidden> Wed, 24 Apr 2019 06:04:51 -0400

CVE-2018-5743 Limiting simultaneous TCP clients is ineffective

About   -   Send Feedback to @ubuntu_updates