[ubuntu/xenial-security] bind9 1:9.10.3.dfsg.P4-8ubuntu1.16 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue May 19 11:31:14 UTC 2020
bind9 (1:9.10.3.dfsg.P4-8ubuntu1.16) xenial-security; urgency=medium
* SECURITY UPDATE: BIND does not sufficiently limit the number of fetches
performed when processing referrals
- debian/patches/CVE-2020-8616.patch: further limit the number of
queries that can be triggered from a request in lib/dns/adb.c,
lib/dns/include/dns/adb.h, lib/dns/resolver.c.
- CVE-2020-8616
* SECURITY UPDATE: A logic error in code which checks TSIG validity can
be used to trigger an assertion failure in tsig.c
- debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG
BADTIME response in lib/dns/tsig.c.
- CVE-2020-8617
bind9 (1:9.10.3.dfsg.P4-8ubuntu1.15) xenial; urgency=medium
* d/p/ubuntu//lp-1833400*: fix race on shutdown (LP: #1833400)
* d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
close to a query timeout (LP: #1797926)
Date: 2020-05-15 13:32:19.115221+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.16
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list