Package "bind9"

Name: bind9


Internet Domain Name Server

Latest version: 1:9.11.5.P4+dfsg-5.1ubuntu2.2
Release: eoan (19.10)
Level: updates
Repository: main
Homepage: https://www.isc.org/downloads/bind/


Download "bind9"

Other versions of "bind9" in Eoan

Repository Area Version
base main 1:9.11.5.P4+dfsg-5.1ubuntu2
security main 1:9.11.5.P4+dfsg-5.1ubuntu2.2

Packages in group

Deleted packages are displayed in grey.


Version: 1:9.11.5.P4+dfsg-5.1ubuntu2.2 2020-05-19 14:06:34 UTC

  bind9 (1:9.11.5.P4+dfsg-5.1ubuntu2.2) eoan-security; urgency=medium

  * SECURITY UPDATE: BIND does not sufficiently limit the number of fetches
    performed when processing referrals
    - debian/patches/CVE-2020-8616.patch: further limit the number of
      queries that can be triggered from a request in lib/dns/adb.c,
      lib/dns/include/dns/adb.h, lib/dns/resolver.c.
    - CVE-2020-8616
  * SECURITY UPDATE: A logic error in code which checks TSIG validity can
    be used to trigger an assertion failure in tsig.c
    - debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG
      BADTIME response in lib/dns/tsig.c.
    - CVE-2020-8617

 -- Marc Deslauriers <email address hidden> Fri, 15 May 2020 08:09:01 -0400

Source diff to previous version

Version: 1:9.11.5.P4+dfsg-5.1ubuntu2.1 2019-11-21 16:07:18 UTC

  bind9 (1:9.11.5.P4+dfsg-5.1ubuntu2.1) eoan-security; urgency=medium

  * SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single
    - debian/patches/CVE-2019-6477.patch: limit number of clients in
      bin/named/client.c, bin/named/include/named/client.h.
    - CVE-2019-6477

 -- Marc Deslauriers <email address hidden> Mon, 18 Nov 2019 09:49:31 -0500

CVE-2019-6477 TCP-pipelined queries can bypass tcp-clients limit

About   -   Send Feedback to @ubuntu_updates