Package "bind9"

Name: bind9


Internet Domain Name Server

Latest version: 1:9.11.5.P1+dfsg-1ubuntu2.6
Release: disco (19.04)
Level: updates
Repository: main
Homepage: https://www.isc.org/downloads/bind/


Save this URL for the latest version of "bind9": https://www.ubuntuupdates.org/bind9

Download "bind9"

Other versions of "bind9" in Disco

Repository Area Version
base main 1:9.11.5.P1+dfsg-1ubuntu2
security main 1:9.11.5.P1+dfsg-1ubuntu2.6

Packages in group

Deleted packages are displayed in grey.


Version: 1:9.11.5.P1+dfsg-1ubuntu2.6 2019-11-21 16:07:16 UTC

  bind9 (1:9.11.5.P1+dfsg-1ubuntu2.6) disco-security; urgency=medium

  * SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single
    - debian/patches/CVE-2019-6477.patch: limit number of clients in
      bin/named/client.c, bin/named/include/named/client.h.
    - CVE-2019-6477

 -- Marc Deslauriers <email address hidden> Mon, 18 Nov 2019 09:52:07 -0500

Source diff to previous version
CVE-2019-6477 TCP-pipelined queries can bypass tcp-clients limit

Version: 1:9.11.5.P1+dfsg-1ubuntu2.5 2019-06-20 13:08:06 UTC

  bind9 (1:9.11.5.P1+dfsg-1ubuntu2.5) disco-security; urgency=medium

  * SECURITY UPDATE: DoS via malformed packets
    - debian/patches/CVE-2019-6471.patch: fix race condition in
    - CVE-2019-6471

 -- Marc Deslauriers <email address hidden> Tue, 18 Jun 2019 18:50:18 -0400

Source diff to previous version
CVE-2019-6471 A race condition when discarding malformed packets can cause BIND to exit with an assertion failure

Version: 1:9.11.5.P1+dfsg-1ubuntu2.4 2019-05-16 10:06:44 UTC

  bind9 (1:9.11.5.P1+dfsg-1ubuntu2.4) disco; urgency=medium

  * d/rules: add back EdDSA support (LP: #1825712)

 -- Andreas Hasenack <email address hidden> Fri, 26 Apr 2019 14:20:00 +0000

Source diff to previous version
1825712 bind9 is compiled without support for EdDSA DNSSEC keys

Version: 1:9.11.5.P1+dfsg-1ubuntu2.3 2019-04-25 16:07:12 UTC

  bind9 (1:9.11.5.P1+dfsg-1ubuntu2.3) disco-security; urgency=medium

  * SECURITY UPDATE: limiting simultaneous TCP clients is ineffective
    - debian/patches/CVE-2018-5743.patch: add reference counting in
      bin/named/client.c, bin/named/include/named/client.h,
      bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c,
      lib/isc/include/isc/quota.h, lib/isc/quota.c,
    - debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic
      operations with isc_refcount reference counting in
      bin/named/client.c, bin/named/include/named/interfacemgr.h,
    - debian/libisc1100.symbols: added new symbols.
    - CVE-2018-5743

 -- Marc Deslauriers <email address hidden> Wed, 24 Apr 2019 05:00:07 -0400

CVE-2018-5743 Limiting simultaneous TCP clients is ineffective

About   -   Send Feedback to @ubuntu_updates