* New upstream releases 9.18.5 - 9.18.12 (LP: #2003586)
- Updates:
+ update-quota option
+ named -V shows supported cryptographic algorithms
- Bug Fixes Include:
+ Fix crash when using dig with +nssearch and +tcp (LP: #1258003)
+ Fix incomplete results using dig with +nssearch (LP: #1970252)
+ CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38178, CVE-2022-3094, CVE-2022-3736, CVE-2022-3924
+ Fix thread safety in dns_dispatch
+ Fix ADB quota management in resolver
+ Fix Prohibited DNS error on allow-recursion
+ Fix crash when restarting server with active statschannel connection
+ Fix use after free for catalog zone processing
+ Fix leak of dns_keyfileio_t objects
+ Fix nslookup failure to use port option when record type ANY is used
+ Fix crash on dnssec-policy zone with NSEC3 and inline-signing turned on
+ Fix inheritance when setting remote server port
+ Fix assertion error when accessing statistics channel
+ Fix rndc dumpdb -expired for stuck cache
+ Fix check for other name servers after receiving FORMERR
+ See https://bind9.readthedocs.io/en/v9_18_12/notes.html#notes-for-bind-9-18-12
for additional bug fixes and information
* Improve dep-8 test suite (LP: #2003584):
- d/t/zonetest: Add dep8 test for checking the domain zone creation process
- d/t/control: Add new test outline
* d/bind9-doc.docs: Stop installing removed file doc/misc/options.active
* d/p/0001-Disable-treat-warnings-as-errors-in-sphinx-build.patch: refresh to
apply with version 9.18.8
* Remove CVE patches fixed upstream:
- debian/patches/CVE-2022-2795.patch
- debian/patches/CVE-2022-2881.patch
- debian/patches/CVE-2022-2906.patch
- debian/patches/CVE-2022-3080.patch
- debian/patches/CVE-2022-38178.patch
[Included in upstream release 9.18.7]
- debian/patches/CVE-2022-3094.patch
- debian/patches/CVE-2022-3736.patch
- debian/patches/CVE-2022-3924.patch
[Included in upstream release 9.18.11]
-- Lena Voytek <email address hidden> Wed, 08 Mar 2023 08:49:53 -0700
This bug was fixed in the package bind9 - 1:9.18. 12-0ubuntu0. 22.10.1
--------------- 12-0ubuntu0. 22.10.1) kinetic; urgency=medium
bind9 (1:9.18.
* New upstream releases 9.18.5 - 9.18.12 (LP: #2003586)
CVE-2022- 38178, CVE-2022-3094, CVE-2022-3736, CVE-2022-3924 /bind9. readthedocs. io/en/v9_ 18_12/notes. html#notes- for-bind- 9-18-12 options. active Disable- treat-warnings- as-errors- in-sphinx- build.patch: refresh to patches/ CVE-2022- 2795.patch patches/ CVE-2022- 2881.patch patches/ CVE-2022- 2906.patch patches/ CVE-2022- 3080.patch patches/ CVE-2022- 38178.patch patches/ CVE-2022- 3094.patch patches/ CVE-2022- 3736.patch patches/ CVE-2022- 3924.patch
- Updates:
+ update-quota option
+ named -V shows supported cryptographic algorithms
- Bug Fixes Include:
+ Fix crash when using dig with +nssearch and +tcp (LP: #1258003)
+ Fix incomplete results using dig with +nssearch (LP: #1970252)
+ CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080,
+ Fix thread safety in dns_dispatch
+ Fix ADB quota management in resolver
+ Fix Prohibited DNS error on allow-recursion
+ Fix crash when restarting server with active statschannel connection
+ Fix use after free for catalog zone processing
+ Fix leak of dns_keyfileio_t objects
+ Fix nslookup failure to use port option when record type ANY is used
+ Fix crash on dnssec-policy zone with NSEC3 and inline-signing turned on
+ Fix inheritance when setting remote server port
+ Fix assertion error when accessing statistics channel
+ Fix rndc dumpdb -expired for stuck cache
+ Fix check for other name servers after receiving FORMERR
+ See https:/
for additional bug fixes and information
* Improve dep-8 test suite (LP: #2003584):
- d/t/zonetest: Add dep8 test for checking the domain zone creation process
- d/t/control: Add new test outline
* d/bind9-doc.docs: Stop installing removed file doc/misc/
* d/p/0001-
apply with version 9.18.8
* Remove CVE patches fixed upstream:
- debian/
- debian/
- debian/
- debian/
- debian/
[Included in upstream release 9.18.7]
- debian/
- debian/
- debian/
[Included in upstream release 9.18.11]
-- Lena Voytek <email address hidden> Wed, 08 Mar 2023 08:49:53 -0700