Change logs for bind9 source package in Impish

  • bind9 (1:9.16.15-1ubuntu1.2) impish-security; urgency=medium
    
      * SECURITY UPDATE: cache poisoning via bogus NS records
        - debian/patches/CVE-2021-25220.patch: tighten rules for acceptance of
          records into the cache in lib/dns/resolver.c.
        - CVE-2021-25220
      * SECURITY UPDATE: DoS via specially crafted TCP stream
        - debian/patches/CVE-2022-0396.patch: ensure correct ordering in
          lib/isc/netmgr/netmgr.c.
        - CVE-2022-0396
    
     -- Marc Deslauriers <email address hidden>  Tue, 15 Mar 2022 10:02:18 -0400
  • bind9 (1:9.16.15-1ubuntu1.1) impish-security; urgency=medium
    
      * SECURITY UPDATE: resolver performance degradation via lame cache abuse
        - debian/patches/CVE-2021-25219.patch: disable lame cache in
          bin/named/config.c, bin/named/server.c, lib/dns/resolver.c.
        - CVE-2021-25219
    
     -- Marc Deslauriers <email address hidden>  Wed, 27 Oct 2021 06:54:36 -0400
  • bind9 (1:9.16.15-1ubuntu1) impish; urgency=medium
    
      * Merge with Debian unstable. Remaining changes:
        - Don't build dnstap as it depends on universe packages:
          + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
            protobuf-c-compiler (universe packages)
          + d/dnsutils.install: don't install dnstap
          + d/libdns1104.symbols: don't include dnstap symbols
          + d/rules: don't build dnstap nor install dnstap.proto
        - Add back apport:
          + d/bind9.apport: add back old bind9 apport hook, but without calling
            attach_conffiles() since that is already done by apport itself, with
            confirmation from the user.
          + d/control, d/rules: buil-depends on dh-apport and use it
        - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
        - d/bind9.named.service: use systemd Type=forking to signal daemon init.
          This fixes a regression of #900788 where services whose startup depend
          on name resolutions may fail due to bind9 not being ready (LP #1899902).
      * Drop changes:
        - d/t/simpletest: drop the internetsociety.org test as it requires
          network egress access that is not available in the Ubuntu autopkgtest
          farm.
          [Fixed in 1:9.16.11-3]
        - SECURITY UPDATE: off-by-one bug in ISC SPNEGO implementation
          + debian/patches/CVE-2020-8625.patch: properly calculate length in
            lib/dns/spnego.c.
          + CVE-2020-8625
          [Fixed in 1:9.16.12-1]
        - SECURITY UPDATE: DoS via broken inbound incremental zone update (IXFR)
          + debian/patches/CVE-2021-25214.patch: immediately reject the entire
            transfer for certain RR in lib/dns/xfrin.c.
          + CVE-2021-25214
          [Fixed in 1:9.16.15-1]
        - SECURITY UPDATE: assert via answering certain queries for DNAME records
          + debian/patches/CVE-2021-25215.patch: fix assert checks in
            lib/ns/query.c.
          + CVE-2021-25215
          [Fixed in 1:9.16.15-1]
        - SECURITY UPDATE: overflow in BIND's GSSAPI security policy negotiation
          + debian/rules: build with --disable-isc-spnego to disable internal
            SPNEGO and use the one from the kerberos libraries.
          + CVE-2021-25216
          [Fixed in 1:9.16.15-1]
    
    bind9 (1:9.16.15-1) unstable; urgency=high
    
      * New upstream version 9.16.15 (Closes: #987741, #987742, #987743)
       + CVE-2021-25214: A malformed incoming IXFR transfer could trigger an
         assertion failure in ``named``, causing it to quit abnormally.
       + CVE-2021-25215: ``named`` crashed when a DNAME record placed in the
         ANSWER section during DNAME chasing turned out to be the final
         answer to a client query.
       + CVE-2021-25216: When a server's configuration set the
        ``tkey-gssapi-keytab`` or ``tkey-gssapi-credential`` option, a
        specially crafted GSS-TSIG query could cause a buffer overflow in
        the ISC implementation of SPNEGO (a protocol enabling negotiation of
        the security mechanism used for GSSAPI authentication).
      * Add patches to implement I-D draft-hardaker-dnsop-nsec3-guidance
    
    bind9 (1:9.16.13-1) unstable; urgency=medium
    
      * New upstream version 9.16.13
      * Add upstream patches to fix TCP timeouts firing too early
    
    bind9 (1:9.16.12-3) unstable; urgency=medium
    
      * Add most important patches from upcoming 9.16.13 release
    
    bind9 (1:9.16.12-2) unstable; urgency=medium
    
      * Add patch to fix sphinx-build failure on Ubuntu Xenial
    
    bind9 (1:9.16.12-1) unstable; urgency=high
    
      * New upstream version 9.16.12
       + [CVE-2020-8625]: Fix off-by-one bug in ISC SPNEGO implementation.
         (Closes: #983004)
      * Adjust the bind9-libs and bind9-dev packages for new upstream library
        names
    
    bind9 (1:9.16.11-3) unstable; urgency=medium
    
      * Split the simple validation test to separate file and mark it as flaky
        (Closes: #976045)
    
    bind9 (1:9.16.11-2) unstable; urgency=medium
    
      * Cherry-pick upstream commit to fix segfault with named ACLs used in
        allow-update (Closes: #980786)
    
    bind9 (1:9.16.11-1) unstable; urgency=medium
    
      * Add the ISC code-signing key for 2021-2022
      * New upstream version 9.16.11
    
    bind9 (1:9.16.10-1) unstable; urgency=medium
    
      * New upstream version 9.16.10
    
    bind9 (1:9.16.9-1) unstable; urgency=medium
    
      * New upstream version 9.16.9
    
     -- Athos Ribeiro <email address hidden>  Mon, 12 Jul 2021 20:26:40 -0300
  • bind9 (1:9.16.8-1ubuntu3.2) impish; urgency=medium
    
      * d/bind9.named.service: use systemd Type=forking to signal daemon init. This
        fixes a regression of #900788 where services whose startup depend on name
        resolutions may fail due to bind9 not being ready (LP: #1899902).
    
     -- Athos Ribeiro <email address hidden>  Fri, 18 Jun 2021 09:24:39 -0300
  • bind9 (1:9.16.8-1ubuntu3.1) hirsute-security; urgency=medium
    
      * SECURITY UPDATE: DoS via broken inbound incremental zone update (IXFR)
        - debian/patches/CVE-2021-25214.patch: immediately reject the entire
          transfer for certain RR in lib/dns/xfrin.c.
        - CVE-2021-25214
      * SECURITY UPDATE: assert via answering certain queries for DNAME records
        - debian/patches/CVE-2021-25215.patch: fix assert checks in
          lib/ns/query.c.
        - CVE-2021-25215
      * SECURITY UPDATE: overflow in BIND's GSSAPI security policy negotiation
        - debian/rules: build with --disable-isc-spnego to disable internal
          SPNEGO and use the one from the kerberos libraries.
        - CVE-2021-25216
    
     -- Marc Deslauriers <email address hidden>  Tue, 27 Apr 2021 07:07:30 -0400
  • bind9 (1:9.16.8-1ubuntu3) hirsute; urgency=medium
    
      * SECURITY UPDATE: off-by-one bug in ISC SPNEGO implementation
        - debian/patches/CVE-2020-8625.patch: properly calculate length in
          lib/dns/spnego.c.
        - CVE-2020-8625
    
     -- Marc Deslauriers <email address hidden>  Thu, 25 Feb 2021 07:29:46 -0500