UbuntuUpdates.org

Package "bind9"

Name: bind9

Description:

Internet Domain Name Server

Latest version: 1:9.11.4+dfsg-3ubuntu5.4
Release: cosmic (18.10)
Level: security
Repository: main
Homepage: https://www.isc.org/downloads/bind/

Links

Save this URL for the latest version of "bind9": https://www.ubuntuupdates.org/bind9


Download "bind9"


Other versions of "bind9" in Cosmic

Repository Area Version
base main 1:9.11.4+dfsg-3ubuntu5
updates main 1:9.11.4+dfsg-3ubuntu5.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1:9.11.4+dfsg-3ubuntu5.4 2019-06-20 13:08:03 UTC

  bind9 (1:9.11.4+dfsg-3ubuntu5.4) cosmic-security; urgency=medium

  * SECURITY UPDATE: DoS via malformed packets
    - debian/patches/CVE-2019-6471.patch: fix race condition in
      lib/dns/dispatch.c.
    - CVE-2019-6471

 -- Marc Deslauriers <email address hidden> Tue, 18 Jun 2019 18:54:20 -0400

Source diff to previous version
CVE-2019-6471 A race condition when discarding malformed packets can cause BIND to exit with an assertion failure

Version: 1:9.11.4+dfsg-3ubuntu5.3 2019-04-25 15:07:09 UTC

  bind9 (1:9.11.4+dfsg-3ubuntu5.3) cosmic-security; urgency=medium

  * SECURITY UPDATE: limiting simultaneous TCP clients is ineffective
    - debian/patches/CVE-2018-5743.patch: add reference counting in
      bin/named/client.c, bin/named/include/named/client.h,
      bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c,
      lib/isc/include/isc/quota.h, lib/isc/quota.c,
      lib/isc/win32/libisc.def.in.
    - debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic
      operations with isc_refcount reference counting in
      bin/named/client.c, bin/named/include/named/interfacemgr.h,
      bin/named/interfacemgr.c.
    - debian/libisc169.symbols: added new symbols.
    - CVE-2018-5743

 -- Marc Deslauriers <email address hidden> Wed, 24 Apr 2019 05:29:02 -0400

Source diff to previous version
CVE-2018-5743 Limiting simultaneous TCP clients is ineffective

Version: 1:9.11.4+dfsg-3ubuntu5.1 2019-02-22 09:06:42 UTC

  bind9 (1:9.11.4+dfsg-3ubuntu5.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: memory leak via specially crafted packet
    - debian/patches/CVE-2018-5744.patch: silently drop additional keytag
      options in bin/named/client.c.
    - CVE-2018-5744
  * SECURITY UPDATE: assertion failure when a trust anchor rolls over to an
    unsupported key algorithm when using managed-keys
    - debian/patches/CVE-2018-5745.patch: properly handle situations when
      the key tag cannot be computed in lib/dns/include/dst/dst.h,
      lib/dns/zone.c.
    - CVE-2018-5745
  * SECURITY UPDATE: Controls for zone transfers may not be properly
    applied to Dynamically Loadable Zones (DLZs) if the zones are writable
    - debian/patches/CVE-2019-6465.patch: handle zone transfers marked in
      the zone table as a DLZ zone bin/named/xfrout.c.
    - CVE-2019-6465

 -- Marc Deslauriers <email address hidden> Wed, 20 Feb 2019 09:02:07 +0100

CVE-2018-5744 A specially crafted packet can cause named to leak memory
CVE-2018-5745 An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys
CVE-2019-6465 Zone transfer controls for writable DLZ zones were not effective



About   -   Send Feedback to @ubuntu_updates