Change logs for bind9 source package in Artful

  • bind9 (1:9.10.3.dfsg.P4-12.6ubuntu1.1) artful-security; urgency=medium
    
      * SECURITY UPDATE: assertion failure via improper cleanup
        - debian/patches/CVE-2017-3145.patch: fix cleanup handling in
          lib/dns/resolver.c.
        - CVE-2017-3145
    
     -- Marc Deslauriers <email address hidden>  Tue, 16 Jan 2018 07:24:33 -0500
  • bind9 (1:9.10.3.dfsg.P4-12.6ubuntu1) artful; urgency=medium
    
      * Merge with Debian unstable (LP: #1712920). Remaining changes:
        - Add RemainAfterExit to bind9-resolvconf unit configuration file
          (LP #1536181).
        - rules: Fix path to libsofthsm2.so. (LP #1685780)
        - d/p/CVE-2016-8864-regression-test.patch: tests for the regression
          introduced with the CVE-2016-8864.patch and fixed in
          CVE-2016-8864-regression.patch.
        - d/p/CVE-2016-8864-regression2-test.patch: tests for the second
          regression (RT #44318) introduced with the CVE-2016-8864.patch
          and fixed in CVE-2016-8864-regression2.patch.
        - d/control, d/rules: add json support for the statistics channels.
          (LP #1669193)
    
    bind9 (1:9.10.3.dfsg.P4-12.6) unstable; urgency=medium
    
      * Non-maintainer upload.
      * Import upcoming DNSSEC KSK-2017 from 9.10.5 (Closes: #860794)
    
     -- Andreas Hasenack <email address hidden>  Thu, 24 Aug 2017 18:28:00 -0300
  • bind9 (1:9.10.3.dfsg.P4-12.5ubuntu1) artful; urgency=medium
    
      * Merge with Debian unstable (LP: #1701687). Remaining changes:
        - Add RemainAfterExit to bind9-resolvconf unit configuration file
          (LP #1536181).
        - rules: Fix path to libsofthsm2.so. (LP #1685780)
      * Drop:
        - SECURITY UPDATE: denial of service via assertion failure
          + debian/patches/CVE-2016-2776.patch: properly handle lengths in
            lib/dns/message.c.
          + CVE-2016-2776
          + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
        - SECURITY UPDATE: assertion failure via class mismatch
          + debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
            records in lib/dns/resolver.c.
          + CVE-2016-9131
          + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
        - SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
          + debian/patches/CVE-2016-9147.patch: fix logic when records are
            returned without the requested data in lib/dns/resolver.c.
          + CVE-2016-9147
          + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
        - SECURITY UPDATE: assertion failure via unusually-formed DS record
          + debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
            lib/dns/message.c, lib/dns/resolver.c.
          + CVE-2016-9444
          + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
        - SECURITY UPDATE: regression in CVE-2016-8864
          + debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
            responses in lib/dns/resolver.c, added tests to
            bin/tests/system/dname/ns2/example.db,
            bin/tests/system/dname/tests.sh.
          + No CVE number
          + [Fixed in Debian 1:9.10.3.dfsg.P4-11 and 1:9.10.3.dfsg.P4-12]
        - SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
          a NULL pointer
          + debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
            combination in bin/named/query.c, lib/dns/message.c,
            lib/dns/rdataset.c.
          + CVE-2017-3135
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
        - SECURITY UPDATE: regression in CVE-2016-8864
          + debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
            was still being cached when it should have been in lib/dns/resolver.c,
            added tests to bin/tests/system/dname/ans3/ans.pl,
            bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
          + No CVE number
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
        - SECURITY UPDATE: Denial of Service due to an error handling
          synthesized records when using DNS64 with "break-dnssec yes;"
          + debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
            called.
          + CVE-2017-3136
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
        - SECURITY UPDATE: Denial of Service due to resolver terminating when
          processing a response packet containing a CNAME or DNAME
          + debian/patches/CVE-2017-3137.patch: don't expect a specific
            ordering of answer components; add testcases.
          + CVE-2017-3137
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3 with 3 patch files]
        - SECURITY UPDATE: Denial of Service when receiving a null command on
          the control channel
          + debian/patches/CVE-2017-3138.patch: don't throw an assert if no
            command token is given; add testcase.
          + CVE-2017-3138
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
        - SECURITY UPDATE: TSIG authentication issues
          + debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
            lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
          + CVE-2017-3142
          + CVE-2017-3143
          + [Fixed in Debian 1:9.10.3.dfsg.P4-12.4]
      * d/p/CVE-2016-8864-regression-test.patch: tests for the regression
        introduced with the CVE-2016-8864.patch and fixed in
        CVE-2016-8864-regression.patch.
      * d/p/CVE-2016-8864-regression2-test.patch: tests for the second
        regression (RT #44318) introduced with the CVE-2016-8864.patch
        and fixed in CVE-2016-8864-regression2.patch.
      * d/control, d/rules: add json support for the statistics channels.
        (LP: #1669193)
    
     -- Andreas Hasenack <email address hidden>  Fri, 11 Aug 2017 17:12:09 -0300
  • bind9 (1:9.10.3.dfsg.P4-10.1ubuntu7) artful; urgency=medium
    
      * SECURITY UPDATE: TSIG authentication issues
        - debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
          lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
        - CVE-2017-3142
        - CVE-2017-3143
    
     -- Marc Deslauriers <email address hidden>  Mon, 03 Jul 2017 09:48:13 -0400
  • bind9 (1:9.10.3.dfsg.P4-10.1ubuntu6) artful; urgency=medium
    
      * rules: Fix path to libsofthsm2.so. (LP: #1685780)
    
     -- Timo Aaltonen <email address hidden>  Mon, 24 Apr 2017 15:01:30 +0300
  • bind9 (1:9.10.3.dfsg.P4-10.1ubuntu5) zesty-security; urgency=medium
    
      * SECURITY UPDATE: Denial of Service due to an error handling
        synthesized records when using DNS64 with "break-dnssec yes;"
        - debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
          called.
        - CVE-2017-3136
      * SECURITY UPDATE: Denial of Service due to resolver terminating when
        processing a response packet containing a CNAME or DNAME
        - debian/patches/CVE-2017-3137.patch: don't expect a specific
          ordering of answer components; add testcases.
        - CVE-2017-3137
      * SECURITY UPDATE: Denial of Service when receiving a null command on
        the control channel
        - debian/patches/CVE-2017-3138.patch: don't throw an assert if no
          command token is given; add testcase.
        - CVE-2017-3138
    
     -- Steve Beattie <email address hidden>  Wed, 12 Apr 2017 01:32:15 -0700
  • bind9 (1:9.10.3.dfsg.P4-10.1ubuntu4) zesty; urgency=medium
    
      * SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
        a NULL pointer
        - debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
          combination in bin/named/query.c, lib/dns/message.c,
          lib/dns/rdataset.c.
        - CVE-2017-3135
      * SECURITY UPDATE: regression in CVE-2016-8864
        - debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
          was still being cached when it should have been in lib/dns/resolver.c,
          added tests to bin/tests/system/dname/ans3/ans.pl,
          bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
        - No CVE number
    
     -- Marc Deslauriers <email address hidden>  Wed, 15 Feb 2017 09:37:39 -0500