Merge ~ahasenack/ubuntu/+source/bind9:groovy-bind-9166-3-merge into ubuntu/+source/bind9:debian/sid
- Git
- lp:~ahasenack/ubuntu/+source/bind9
- groovy-bind-9166-3-merge
- Merge into debian/sid
Status: | Merged |
---|---|
Approved by: | Andreas Hasenack |
Approved revision: | c031cd2b77032956bc2eb25f7fc35cb9e69a7c9b |
Merge reported by: | Christian Ehrhardt |
Merged at revision: | c031cd2b77032956bc2eb25f7fc35cb9e69a7c9b |
Proposed branch: | ~ahasenack/ubuntu/+source/bind9:groovy-bind-9166-3-merge |
Merge into: | ubuntu/+source/bind9:debian/sid |
Diff against target: |
1233 lines (+1052/-14) 8 files modified
debian/NEWS (+24/-0) debian/bind9-dnsutils.install (+0/-2) debian/bind9.apport (+24/-0) debian/changelog (+998/-0) debian/control (+3/-4) debian/rules (+2/-3) debian/tests/control (+1/-1) debian/tests/simpletest (+0/-4) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Christian Ehrhardt (community) | Approve | ||
Canonical Server | Pending | ||
Review via email: mp+390746@code.launchpad.net |
Commit message
Description of the change
Quick merge from debian to grab to assertion fixes from upstream, and a systemd service change to restart the daemon if it fails.
Of these, *maybe* the systemd change qualifies for an FFe? But I think not.
PPA with proposed and all arches enabled: https:/
Andreas Hasenack (ahasenack) wrote : | # |
Andreas Hasenack (ahasenack) wrote : | # |
To install from the ppa, you will have to enable proposed, as bind9 in the ppa built with the new glibc already.
A quick test is to run systemctl status bind9, then sudo kill <bind9-pid>, and run status again. The daemon from the previous package will remain dead, and the one from the new package will be automatically restarted.
Christian Ehrhardt (paelzer) wrote : | # |
Actually just two changes:
4 * Add upstream patches to fix some rare conditions (Closes: #969448)
=> OK
7 * Set Restart=on-failure in systemd unit
There was unfortunately no bug referencedthat discussed this, but still so many other services do that and also systemd has rate limiting for restarts.
Bind9 is not known to fatally run into problems when restarted - and having it back up sounds good fur such a core service right.
This should be safe without FFe IMHO.
Christian Ehrhardt (paelzer) wrote : | # |
++ - d/not-installed: list dnstap-read.1 manpage, which is being
++ installed by the makefile even when dnstap is disabled.
++ [Fixed upstream]
That must be disabled a bit longer then, since we didn't change upstream code right?
The build shows no complains about it anymore - so ok
Christian Ehrhardt (paelzer) wrote : | # |
The changelog looks good and
$ git range-diff pkg/import/
Agrees on this being otherwise delta retained as-is.
+1
Andreas Hasenack (ahasenack) wrote : | # |
> Actually just two changes:
>
> 4 * Add upstream patches to fix some rare conditions (Closes: #969448)
> => OK
>
> 7 * Set Restart=on-failure in systemd unit
>
>
> There was unfortunately no bug referencedthat discussed this, but still so
> many other services do that and also systemd has rate limiting for restarts.
> Bind9 is not known to fatally run into problems when restarted - and having it
> back up sounds good fur such a core service right.
> This should be safe without FFe IMHO.
The restart was discussed in tha debian bug, actually. Since bind9 died because of the assertion error, they wondered if restart on-failure shouldn't be set by default:
"""
> It happened again. In the meantime I had added the line
>
> Restart=on-failure
>
> to the [Service] section of /lib/systemd/
> name server was automatically restarted.
I wonder whether we should just do this in general. Crashes can and do
happen, no software is error free.
Bernhard
"""
Andreas Hasenack (ahasenack) wrote : | # |
> ++ - d/not-installed: list dnstap-read.1 manpage, which is being
> ++ installed by the makefile even when dnstap is disabled.
> ++ [Fixed upstream]
>
> That must be disabled a bit longer then, since we didn't change upstream code
> right?
> The build shows no complains about it anymore - so ok
I dropped d/not-installed in 1:9.16.6-2ubuntu1
Andreas Hasenack (ahasenack) wrote : | # |
Tagging and uploading c031cd2b7703295
$ git push pkg upload/
Enumerating objects: 52, done.
Counting objects: 100% (52/52), done.
Delta compression using up to 4 threads
Compressing objects: 100% (40/40), done.
Writing objects: 100% (43/43), 12.91 KiB | 322.00 KiB/s, done.
Total 43 (delta 29), reused 6 (delta 3)
To ssh://git.
* [new tag] upload/
$ dput ubuntu ../bind9_
Checking signature on .changes
gpg: ../bind9_
Checking signature on .dsc
gpg: ../bind9_
Uploading to ubuntu (via ftp to upload.ubuntu.com):
Uploading bind9_9.
Uploading bind9_9.
Uploading bind9_9.
Uploading bind9_9.
Successfully uploaded packages.
Christian Ehrhardt (paelzer) wrote : | # |
merged
bind9 | 1:9.16.6-3ubuntu1 | groovy | source, amd64, arm64, armhf, i386, ppc64el, riscv64, s390x
Preview Diff
1 | diff --git a/debian/NEWS b/debian/NEWS |
2 | new file mode 100644 |
3 | index 0000000..c9348a4 |
4 | --- /dev/null |
5 | +++ b/debian/NEWS |
6 | @@ -0,0 +1,24 @@ |
7 | +bind9 (1:9.16.0-1ubuntu1) focal; urgency=medium |
8 | + |
9 | + Some packages like isc-dhcp do not build with bind 9.14 or higher, so a new |
10 | + source package bind9-libs version 9.11 was created for that purpose, |
11 | + providing only libraries and header files. The bind9 9.16.x packages do not |
12 | + provide development libraries or headers. See commit |
13 | + https://salsa.debian.org/dns-team/bind9-libs/commit/40cab7029d for more |
14 | + details. udebs used in the debian-installer are also being provided by |
15 | + bind9-libs. |
16 | + |
17 | + Another package which doesn't build with the newer bind9 package is |
18 | + bind-dyndb-ldap. It will build using the libraries from bind9-libs, but |
19 | + since this is a server plugin, it won't work with the newer server. |
20 | + |
21 | + Native pkcs#11 support via softhsm2 is no longer being built for this |
22 | + package. This was first introduced in 1:9.10.3.dfsg.P4-8 (see |
23 | + https://bugs.launchpad.net/bugs/1565392) for FreeIPA. Ubuntu Focal no longer |
24 | + ships FreeIPA, and Debian also dropped the native pkcs#11 support. |
25 | + |
26 | + There are no development libraries or header files in this bind9 9.16.x |
27 | + packaging at the moment. This may change later, see |
28 | + https://gitlab.isc.org/isc-projects/bind9/merge_requests/3089#note_111229 |
29 | + |
30 | + -- Andreas Hasenack <andreas@canonical.com> Sat, 22 Feb 2020 17:40:38 -0300 |
31 | diff --git a/debian/bind9-dnsutils.install b/debian/bind9-dnsutils.install |
32 | index 90e4fba..5e6b7d9 100644 |
33 | --- a/debian/bind9-dnsutils.install |
34 | +++ b/debian/bind9-dnsutils.install |
35 | @@ -1,12 +1,10 @@ |
36 | usr/bin/delv |
37 | usr/bin/dig |
38 | -usr/bin/dnstap-read |
39 | usr/bin/mdig |
40 | usr/bin/nslookup |
41 | usr/bin/nsupdate |
42 | usr/share/man/man1/delv.1 |
43 | usr/share/man/man1/dig.1 |
44 | -usr/share/man/man1/dnstap-read.1 |
45 | usr/share/man/man1/mdig.1 |
46 | usr/share/man/man1/nslookup.1 |
47 | usr/share/man/man1/nsupdate.1 |
48 | diff --git a/debian/bind9.apport b/debian/bind9.apport |
49 | new file mode 100644 |
50 | index 0000000..b3baa8b |
51 | --- /dev/null |
52 | +++ b/debian/bind9.apport |
53 | @@ -0,0 +1,24 @@ |
54 | +'''apport hook for bind9 |
55 | + |
56 | +(c) 2010 Andres Rodriguez. |
57 | +Author: Andres Rodriguez <andreserl@ubuntu.com> |
58 | + |
59 | +This program is free software; you can redistribute it and/or modify it |
60 | +under the terms of the GNU General Public License as published by the |
61 | +Free Software Foundation; either version 2 of the License, or (at your |
62 | +option) any later version. See http://www.gnu.org/copyleft/gpl.html for |
63 | +the full text of the license. |
64 | +''' |
65 | + |
66 | +from apport.hookutils import * |
67 | +import re |
68 | + |
69 | +def add_info(report, ui): |
70 | + |
71 | + # getting syslog stuff |
72 | + report['SyslogBind9'] = recent_syslog(re.compile(r'named\[')) |
73 | + |
74 | + # Attaching related packages info |
75 | + attach_related_packages(report, ['bind9utils', 'apparmor']) |
76 | + |
77 | + attach_mac_events(report, '/usr/sbin/named') |
78 | diff --git a/debian/changelog b/debian/changelog |
79 | index 6abe704..d6c8a66 100644 |
80 | --- a/debian/changelog |
81 | +++ b/debian/changelog |
82 | @@ -1,3 +1,28 @@ |
83 | +bind9 (1:9.16.6-3ubuntu1) groovy; urgency=medium |
84 | + |
85 | + * Merge with Debian unstable. Remaining changes: |
86 | + - Don't build dnstap as it depends on universe packages: |
87 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
88 | + protobuf-c-compiler (universe packages) |
89 | + + d/dnsutils.install: don't install dnstap |
90 | + + d/libdns1104.symbols: don't include dnstap symbols |
91 | + + d/rules: don't build dnstap nor install dnstap.proto |
92 | + - Add back apport: |
93 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
94 | + attach_conffiles() since that is already done by apport itself, with |
95 | + confirmation from the user. |
96 | + + d/control, d/rules: buil-depends on dh-apport and use it |
97 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
98 | + network egress access that is not available in the Ubuntu autopkgtest |
99 | + farm. |
100 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
101 | + - d/t/control: change the dep8 test dependency to be on the real |
102 | + bind9-dnsutils package, and not the transitional one (LP #1864761) |
103 | + - d/rules: change deprecated --with-libjson-c configure argument to |
104 | + --with-json-c |
105 | + |
106 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 15 Sep 2020 10:46:52 -0300 |
107 | + |
108 | bind9 (1:9.16.6-3) unstable; urgency=medium |
109 | |
110 | [ Ondřej Surý ] |
111 | @@ -8,6 +33,35 @@ bind9 (1:9.16.6-3) unstable; urgency=medium |
112 | |
113 | -- Bernhard Schmidt <berni@debian.org> Tue, 15 Sep 2020 00:26:14 +0200 |
114 | |
115 | +bind9 (1:9.16.6-2ubuntu1) groovy; urgency=medium |
116 | + |
117 | + * Merge with Debian unstable. Remaining changes: |
118 | + - Don't build dnstap as it depends on universe packages: |
119 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
120 | + protobuf-c-compiler (universe packages) |
121 | + + d/dnsutils.install: don't install dnstap |
122 | + + d/libdns1104.symbols: don't include dnstap symbols |
123 | + + d/rules: don't build dnstap nor install dnstap.proto |
124 | + - Add back apport: |
125 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
126 | + attach_conffiles() since that is already done by apport itself, with |
127 | + confirmation from the user. |
128 | + + d/control, d/rules: buil-depends on dh-apport and use it |
129 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
130 | + network egress access that is not available in the Ubuntu autopkgtest |
131 | + farm. |
132 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
133 | + - d/t/control: change the dep8 test dependency to be on the real |
134 | + bind9-dnsutils package, and not the transitional one (LP #1864761) |
135 | + - d/rules: change deprecated --with-libjson-c configure argument to |
136 | + --with-json-c |
137 | + * Dropped: |
138 | + - d/not-installed: list dnstap-read.1 manpage, which is being |
139 | + installed by the makefile even when dnstap is disabled. |
140 | + [Fixed upstream] |
141 | + |
142 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 24 Aug 2020 10:57:08 -0300 |
143 | + |
144 | bind9 (1:9.16.6-2) unstable; urgency=medium |
145 | |
146 | * Move Build-Depends for documentation to Build-Depends-Indep, this |
147 | @@ -30,6 +84,51 @@ bind9 (1:9.16.5-1) unstable; urgency=medium |
148 | |
149 | -- Ondřej Surý <ondrej@debian.org> Thu, 16 Jul 2020 00:29:57 +0200 |
150 | |
151 | +bind9 (1:9.16.4-1ubuntu2) groovy; urgency=medium |
152 | + |
153 | + * No change rebuild against new json-c ABI. |
154 | + |
155 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 28 Jul 2020 17:42:17 +0100 |
156 | + |
157 | +bind9 (1:9.16.4-1ubuntu1) groovy; urgency=medium |
158 | + |
159 | + * Merge with Debian unstable. Remaining changes: |
160 | + - Don't build dnstap as it depends on universe packages: |
161 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
162 | + protobuf-c-compiler (universe packages) |
163 | + + d/dnsutils.install: don't install dnstap |
164 | + + d/libdns1104.symbols: don't include dnstap symbols |
165 | + + d/rules: don't build dnstap nor install dnstap.proto |
166 | + - Add back apport: |
167 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
168 | + attach_conffiles() since that is already done by apport itself, with |
169 | + confirmation from the user. |
170 | + + d/control, d/rules: buil-depends on dh-apport and use it |
171 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
172 | + network egress access that is not available in the Ubuntu autopkgtest |
173 | + farm. |
174 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
175 | + - d/t/control: change the dep8 test dependency to be on the real |
176 | + bind9-dnsutils package, and not the transitional one (LP #1864761) |
177 | + - d/rules: change deprecated --with-libjson-c configure argument to |
178 | + --with-json-c |
179 | + * Dropped: |
180 | + - SECURITY UPDATE: assertion when attempting to fill oversized TCP buffer |
181 | + + debian/patches/CVE-2020-8618.patch: add fix to lib/ns/client.c, |
182 | + lib/ns/include/ns/client.h, lib/ns/xfrout.c. |
183 | + + CVE-2020-8618 |
184 | + [Fixed upstream] |
185 | + - SECURITY UPDATE: INSIST failure when a zone with an interior wildcard |
186 | + label was queried in a certain pattern |
187 | + + debian/patches/CVE-2020-8619.patch: add fix to lib/dns/rbtdb.c. |
188 | + + CVE-2020-8619 |
189 | + [Fixed upstream] |
190 | + * Added changes: |
191 | + - d/not-installed: list dnstap-read.1 manpage, which is being |
192 | + installed by the makefile even when dnstap is disabled. |
193 | + |
194 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Jul 2020 15:22:36 -0300 |
195 | + |
196 | bind9 (1:9.16.4-1) unstable; urgency=medium |
197 | |
198 | * New upstream version 9.16.4 |
199 | @@ -37,12 +136,129 @@ bind9 (1:9.16.4-1) unstable; urgency=medium |
200 | |
201 | -- Ondřej Surý <ondrej@debian.org> Wed, 17 Jun 2020 09:27:29 +0200 |
202 | |
203 | +bind9 (1:9.16.3-1ubuntu2) groovy; urgency=medium |
204 | + |
205 | + * SECURITY UPDATE: assertion when attempting to fill oversized TCP buffer |
206 | + - debian/patches/CVE-2020-8618.patch: add fix to lib/ns/client.c, |
207 | + lib/ns/include/ns/client.h, lib/ns/xfrout.c. |
208 | + - CVE-2020-8618 |
209 | + * SECURITY UPDATE: INSIST failure when a zone with an interior wildcard |
210 | + label was queried in a certain pattern |
211 | + - debian/patches/CVE-2020-8619.patch: add fix to lib/dns/rbtdb.c. |
212 | + - CVE-2020-8619 |
213 | + |
214 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 18 Jun 2020 08:29:47 -0400 |
215 | + |
216 | +bind9 (1:9.16.3-1ubuntu1) groovy; urgency=medium |
217 | + |
218 | + * Merge with Debian unstable. Remaining changes: |
219 | + - Don't build dnstap as it depends on universe packages: |
220 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
221 | + protobuf-c-compiler (universe packages) |
222 | + + d/dnsutils.install: don't install dnstap |
223 | + + d/libdns1104.symbols: don't include dnstap symbols |
224 | + + d/rules: don't build dnstap nor install dnstap.proto |
225 | + - Add back apport: |
226 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
227 | + attach_conffiles() since that is already done by apport itself, with |
228 | + confirmation from the user. |
229 | + + d/control, d/rules: buil-depends on dh-apport and use it |
230 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
231 | + network egress access that is not available in the Ubuntu autopkgtest |
232 | + farm. |
233 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
234 | + - d/t/control: change the dep8 test dependency to be on the real |
235 | + bind9-dnsutils package, and not the transitional one (LP #1864761) |
236 | + - d/rules: change deprecated --with-libjson-c configure argument to |
237 | + --with-json-c |
238 | + * Dropped: |
239 | + - d/control: make bind9-dnsutils multi-arch foreign as another step |
240 | + towards fixing LP #1864761 |
241 | + [The correct fix was to change the dep8 dependency to be on the real |
242 | + package, and not the transitional one] |
243 | + - SECURITY UPDATE: BIND does not sufficiently limit the number of fetches |
244 | + performed when processing referrals |
245 | + + debian/patches/CVE-2020-8616.patch: further limit the number of |
246 | + queries that can be triggered from a request in lib/dns/adb.c, |
247 | + lib/dns/include/dns/adb.h, lib/dns/resolver.c. |
248 | + + CVE-2020-8616 |
249 | + [Fixed upstream] |
250 | + - SECURITY UPDATE: A logic error in code which checks TSIG validity can |
251 | + be used to trigger an assertion failure in tsig.c |
252 | + + debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG |
253 | + BADTIME response in lib/dns/tsig.c. |
254 | + + CVE-2020-8617 |
255 | + [Fixed upstream] |
256 | + |
257 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 02 Jun 2020 17:37:44 -0300 |
258 | + |
259 | bind9 (1:9.16.3-1) unstable; urgency=medium |
260 | |
261 | * New upstream version 9.16.3 |
262 | |
263 | -- Ondřej Surý <ondrej@debian.org> Tue, 19 May 2020 14:14:35 +0200 |
264 | |
265 | +bind9 (1:9.16.2-3ubuntu1) groovy; urgency=medium |
266 | + |
267 | + * Merge with Debian unstable. Remaining changes: |
268 | + - Don't build dnstap as it depends on universe packages: |
269 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
270 | + protobuf-c-compiler (universe packages) |
271 | + + d/dnsutils.install: don't install dnstap |
272 | + + d/libdns1104.symbols: don't include dnstap symbols |
273 | + + d/rules: don't build dnstap nor install dnstap.proto |
274 | + - Add back apport: |
275 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
276 | + attach_conffiles() since that is already done by apport itself, with |
277 | + confirmation from the user. |
278 | + + d/control, d/rules: buil-depends on dh-apport and use it |
279 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
280 | + network egress access that is not available in the Ubuntu autopkgtest |
281 | + farm. |
282 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
283 | + - d/t/control: change the dep8 test dependency to be on the real |
284 | + bind9-dnsutils package, and not the transitional one (LP #1864761) |
285 | + - d/control: make bind9-dnsutils multi-arch foreign as another step |
286 | + towards fixing LP #1864761 |
287 | + - d/rules: change deprecated --with-libjson-c configure argument to |
288 | + --with-json-c |
289 | + - SECURITY UPDATE: BIND does not sufficiently limit the number of fetches |
290 | + performed when processing referrals |
291 | + + debian/patches/CVE-2020-8616.patch: further limit the number of |
292 | + queries that can be triggered from a request in lib/dns/adb.c, |
293 | + lib/dns/include/dns/adb.h, lib/dns/resolver.c. |
294 | + + CVE-2020-8616 |
295 | + - SECURITY UPDATE: A logic error in code which checks TSIG validity can |
296 | + be used to trigger an assertion failure in tsig.c |
297 | + + debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG |
298 | + BADTIME response in lib/dns/tsig.c. |
299 | + + CVE-2020-8617 |
300 | + * Dropped: |
301 | + - use iproute2 instead of net-tools (LP #1850699): |
302 | + + d/control: replace net-tools depends with iproute2 |
303 | + + d/bind9.init: use ip instead of ifconfig |
304 | + [In 1:9.16.1-2] |
305 | + - d/control: Enable readline-like support in dnsutils (nslookup and nsupdate) |
306 | + via libedit-dev (libreadline has a license conflict with bind) |
307 | + [In 1:9.16.1-2] |
308 | + - d/control: drop hardcoded python3 dependency |
309 | + (LP #1856211, Closes #946643) |
310 | + [In 1:9.16.1-2] |
311 | + - d/extras/apparmor.d/usr.sbin.named: |
312 | + + Add flags=(attach_disconnected) to AppArmor profile |
313 | + + AppArmor: Allow /var/tmp/krb5_* (owner-only) for Samba AD DLZ |
314 | + (Closes: #928398) |
315 | + [In 1:9.16.1-2] |
316 | + - d/rules: fix typo in the apparmor profile installation |
317 | + [In 1:9.16.1-2] |
318 | + - d/control: create transitional packages for dnsutils, bind9utils |
319 | + [In 1:9.16.1-2] |
320 | + - d/p/fix-rebinding-protection.patch: fix rebinding protection bug |
321 | + when using forwarder setups (LP #1873046) |
322 | + [Fixed upstream] |
323 | + |
324 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 22 May 2020 09:52:13 -0300 |
325 | + |
326 | bind9 (1:9.16.2-3) unstable; urgency=medium |
327 | |
328 | [ Simon Deziel ] |
329 | @@ -93,6 +309,106 @@ bind9 (1:9.16.1-1) experimental; urgency=medium |
330 | |
331 | -- Ondřej Surý <ondrej@debian.org> Fri, 20 Mar 2020 13:59:34 +0100 |
332 | |
333 | +bind9 (1:9.16.1-0ubuntu3) groovy; urgency=medium |
334 | + |
335 | + * SECURITY UPDATE: BIND does not sufficiently limit the number of fetches |
336 | + performed when processing referrals |
337 | + - debian/patches/CVE-2020-8616.patch: further limit the number of |
338 | + queries that can be triggered from a request in lib/dns/adb.c, |
339 | + lib/dns/include/dns/adb.h, lib/dns/resolver.c. |
340 | + - CVE-2020-8616 |
341 | + * SECURITY UPDATE: A logic error in code which checks TSIG validity can |
342 | + be used to trigger an assertion failure in tsig.c |
343 | + - debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG |
344 | + BADTIME response in lib/dns/tsig.c. |
345 | + - CVE-2020-8617 |
346 | + |
347 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 19 May 2020 09:03:32 -0400 |
348 | + |
349 | +bind9 (1:9.16.1-0ubuntu2) focal; urgency=medium |
350 | + |
351 | + * d/p/fix-rebinding-protection.patch: fix rebinding protection bug |
352 | + when using forwarder setups (LP: #1873046) |
353 | + |
354 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 15 Apr 2020 14:59:51 -0300 |
355 | + |
356 | +bind9 (1:9.16.1-0ubuntu1) focal; urgency=medium |
357 | + |
358 | + * New upstream release: 19.16.1 (LP: #1868272) |
359 | + - drop d/p/bind-v9.16.0-tcp_quota_fix.patch, fixed upstream |
360 | + - drop d/p/Fix-dns_client_addtrustedkey.patch, fixed upstream |
361 | + * d/rules: change deprecated --with-libjson-c configure argument to |
362 | + --with-json-c |
363 | + |
364 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 24 Mar 2020 11:44:46 -0300 |
365 | + |
366 | +bind9 (1:9.16.0-1ubuntu5) focal; urgency=medium |
367 | + |
368 | + * d/control, d/rules: enable GeoIP2 support, since libmaxminddb is now |
369 | + in main (LP: #1866875) |
370 | + |
371 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 16 Mar 2020 16:17:47 -0300 |
372 | + |
373 | +bind9 (1:9.16.0-1ubuntu4) focal; urgency=medium |
374 | + |
375 | + * d/p/bind-v9.16.0-tcp_quota_fix.patch: fix error in handling TCP |
376 | + client quota limits (LP: #1866378) |
377 | + * d/p/Fix-dns_client_addtrustedkey.patch: fix buffer size in |
378 | + dns_client_addtrustedkey (LP: #1866384) |
379 | + |
380 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 06 Mar 2020 15:12:56 -0300 |
381 | + |
382 | +bind9 (1:9.16.0-1ubuntu3) focal; urgency=medium |
383 | + |
384 | + * d/control: make bind9-dnsutils multi-arch foreign as another step |
385 | + towards fixing LP: #1864761 |
386 | + |
387 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 26 Feb 2020 20:19:40 -0300 |
388 | + |
389 | +bind9 (1:9.16.0-1ubuntu2) focal; urgency=medium |
390 | + |
391 | + * d/t/control: change the dep8 test dependency to be on the real |
392 | + bind9-dnsutils package, and not the transitional one (LP: #1864761) |
393 | + |
394 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 26 Feb 2020 14:16:04 -0300 |
395 | + |
396 | +bind9 (1:9.16.0-1ubuntu1) focal; urgency=medium |
397 | + |
398 | + * Merge with Debian unstable. Remaining changes: |
399 | + - Don't build dnstap as it depends on universe packages: |
400 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
401 | + protobuf-c-compiler (universe packages) |
402 | + + d/dnsutils.install: don't install dnstap |
403 | + + d/libdns1104.symbols: don't include dnstap symbols |
404 | + + d/rules: don't build dnstap nor install dnstap.proto |
405 | + - Add back apport: |
406 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
407 | + attach_conffiles() since that is already done by apport itself, with |
408 | + confirmation from the user. |
409 | + + d/control, d/rules: buil-depends on dh-apport and use it |
410 | + - d/control, d/rules: go back to old geoip support, since |
411 | + libmaxminddb (for GeoIP2) is in universe |
412 | + * Added back from sid packaging: |
413 | + - d/t/control, d/t/simpletest: bring back the dep8 test from |
414 | + debian/sid, with our delta to not query external hosts |
415 | + - use iproute2 instead of net-tools (LP #1850699): |
416 | + + d/control: replace net-tools depends with iproute2 |
417 | + + d/bind9.init: use ip instead of ifconfig |
418 | + - d/control: drop hardcoded python3 dependency |
419 | + (LP #1856211, Closes #946643) |
420 | + - d/extras/apparmor.d/usr.sbin.named: |
421 | + + Add flags=(attach_disconnected) to AppArmor profile |
422 | + + AppArmor: Allow /var/tmp/krb5_* (owner-only) for Samba AD DLZ |
423 | + (Closes: #928398) |
424 | + - d/rules: fix typo in the apparmor profile installation |
425 | + * Added: |
426 | + - d/control: create transitional packages for dnsutils, bind9utils |
427 | + - d/NEWS: mention some of the bigger changes in 9.16.0 packaging |
428 | + - d/control: Enable readline-like support in dnsutils (nslookup and nsupdate) |
429 | + via libedit-dev (libreadline has a license conflict with bind) |
430 | + |
431 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 24 Feb 2020 11:51:37 -0300 |
432 | + |
433 | bind9 (1:9.16.0-1) experimental; urgency=medium |
434 | |
435 | * Change the branch to 9.16 |
436 | @@ -384,6 +700,462 @@ bind (1:9.12.0+dfsg-1~exp0) experimental; urgency=medium |
437 | |
438 | -- Ondřej Surý <ondrej@debian.org> Wed, 24 Jan 2018 09:18:13 +0000 |
439 | |
440 | +bind9 (1:9.11.14+dfsg-3ubuntu1) focal; urgency=medium |
441 | + |
442 | + * Merge with Debian unstable. Remaining changes: |
443 | + - Don't build dnstap as it depends on universe packages: |
444 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
445 | + protobuf-c-compiler (universe packages) |
446 | + + d/dnsutils.install: don't install dnstap |
447 | + + d/libdns1104.symbols: don't include dnstap symbols |
448 | + + d/rules: don't build dnstap nor install dnstap.proto |
449 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
450 | + network egress access that is not available in the Ubuntu autopkgtest |
451 | + farm. |
452 | + - Add back apport: |
453 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
454 | + attach_conffiles() since that is already done by apport itself, with |
455 | + confirmation from the user. |
456 | + + d/control, d/rules: buil-depends on dh-apport and use it |
457 | + - d/control, d/rules: go back to old geoip support, since |
458 | + libmaxminddb (for GeoIP2) is in universe |
459 | + * Dropped: |
460 | + - use iproute2 instead of net-tools (LP #1850699): |
461 | + + d/control: replace net-tools depends with iproute2 |
462 | + + d/bind9.init: use ip instead of ifconfig |
463 | + [In 1:9.11.14+dfsg-2] |
464 | + - d/control: drop hardcoded python3 dependency in bind9utils, |
465 | + dh-python injects the correct one via ${python3:Depends} |
466 | + (LP #1856211, Closes #946643) |
467 | + [In 1:9.11.14+dfsg-1] |
468 | + |
469 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 27 Jan 2020 11:47:26 -0300 |
470 | + |
471 | +bind9 (1:9.11.14+dfsg-1ubuntu1) focal; urgency=medium |
472 | + |
473 | + * Merge with Debian unstable. Remaining changes: |
474 | + - Don't build dnstap as it depends on universe packages: |
475 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
476 | + protobuf-c-compiler (universe packages) |
477 | + + d/dnsutils.install: don't install dnstap |
478 | + + d/libdns1104.symbols: don't include dnstap symbols |
479 | + + d/rules: don't build dnstap nor install dnstap.proto |
480 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
481 | + network egress access that is not available in the Ubuntu autopkgtest |
482 | + farm. |
483 | + - use iproute2 instead of net-tools (LP #1850699): |
484 | + + d/control: replace net-tools depends with iproute2 |
485 | + + d/bind9.init: use ip instead of ifconfig |
486 | + [Updated to also check the exit status of the command] |
487 | + - d/control: drop hardcoded python3 dependency in bind9utils, |
488 | + dh-python injects the correct one via ${python3:Depends} |
489 | + (LP #1856211, Closes: #946643) |
490 | + * Dropped: |
491 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
492 | + option (LP #1804648) |
493 | + [Fixed upstream in 9.11.6rc1] |
494 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
495 | + close to a query timeout (LP #1797926) |
496 | + [Fixed upstream in 9.11.6rc1] |
497 | + - SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single |
498 | + connection |
499 | + + debian/patches/CVE-2019-6477.patch: limit number of clients in |
500 | + bin/named/client.c, bin/named/include/named/client.h. |
501 | + + CVE-2019-6477 |
502 | + [Fixed upstream in 9.11.13] |
503 | + * Added: |
504 | + - Add back apport: |
505 | + + d/bind9.apport: add back old bind9 apport hook, but without calling |
506 | + attach_conffiles() since that is already done by apport itself, with |
507 | + confirmation from the user. |
508 | + + d/control, d/rules: buil-depends on dh-apport and use it |
509 | + - d/control, d/rules: go back to old geoip support, since |
510 | + libmaxminddb (for GeoIP2) is in universe |
511 | + |
512 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 15 Jan 2020 14:07:05 -0300 |
513 | + |
514 | +bind9 (1:9.11.5.P4+dfsg-5.1ubuntu5) focal; urgency=medium |
515 | + |
516 | + * d/control: drop hardcoded python3 dependency in bind9utils, |
517 | + dh-python injects the correct one via ${python3:Depends} |
518 | + (LP: #1856211, Closes: #946643) |
519 | + |
520 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 12 Dec 2019 14:40:20 -0300 |
521 | + |
522 | +bind9 (1:9.11.5.P4+dfsg-5.1ubuntu4) focal; urgency=medium |
523 | + |
524 | + * SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single |
525 | + connection |
526 | + - debian/patches/CVE-2019-6477.patch: limit number of clients in |
527 | + bin/named/client.c, bin/named/include/named/client.h. |
528 | + - CVE-2019-6477 |
529 | + |
530 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 21 Nov 2019 07:50:24 -0500 |
531 | + |
532 | +bind9 (1:9.11.5.P4+dfsg-5.1ubuntu3) focal; urgency=medium |
533 | + |
534 | + * use iproute2 instead of net-tools (LP: #1850699): |
535 | + - d/control: replace net-tools depends with iproute2 |
536 | + - d/bind9.init: use ip instead of ifconfig |
537 | + * d/bind9.install, d/control, d/rules: re-enable lmdb, which is now |
538 | + in main. |
539 | + |
540 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 08 Nov 2019 10:15:01 -0300 |
541 | + |
542 | +bind9 (1:9.11.5.P4+dfsg-5.1ubuntu2) eoan; urgency=medium |
543 | + |
544 | + * Rebuild against new libjson-c4. |
545 | + |
546 | + -- Gianfranco Costamagna <locutusofborg@debian.org> Sat, 29 Jun 2019 13:45:33 +0200 |
547 | + |
548 | +bind9 (1:9.11.5.P4+dfsg-5.1ubuntu1) eoan; urgency=medium |
549 | + |
550 | + * Merge with Debian unstable. Remaining changes: |
551 | + - Build without lmdb support as that package is in Universe |
552 | + - Don't build dnstap as it depends on universe packages: |
553 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
554 | + protobuf-c-compiler (universe packages) |
555 | + + d/dnsutils.install: don't install dnstap |
556 | + + d/libdns1104.symbols: don't include dnstap symbols |
557 | + + d/rules: don't build dnstap nor install dnstap.proto |
558 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
559 | + option (LP #1804648) |
560 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
561 | + close to a query timeout (LP #1797926) |
562 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
563 | + network egress access that is not available in the Ubuntu autopkgtest |
564 | + farm. |
565 | + * Dropped: |
566 | + - SECURITY UPDATE: DoS via malformed packets |
567 | + + d/p/CVE-2019-6471.patch: fix race condition in lib/dns/dispatch.c |
568 | + + CVE-2019-6471 |
569 | + [Fixed in 1:9.11.5.P4+dfsg-5.1] |
570 | + |
571 | + -- Rafael David Tinoco <rafaeldtinoco@ubuntu.com> Thu, 27 Jun 2019 14:54:25 +0000 |
572 | + |
573 | +bind9 (1:9.11.5.P4+dfsg-5ubuntu1) eoan; urgency=medium |
574 | + |
575 | + * Merge with Debian unstable. Remaining changes: |
576 | + - Build without lmdb support as that package is in Universe |
577 | + - Don't build dnstap as it depends on universe packages: |
578 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
579 | + protobuf-c-compiler (universe packages) |
580 | + + d/dnsutils.install: don't install dnstap |
581 | + + d/libdns1104.symbols: don't include dnstap symbols |
582 | + + d/rules: don't build dnstap nor install dnstap.proto |
583 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
584 | + option (LP #1804648) |
585 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
586 | + close to a query timeout (LP #1797926) |
587 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
588 | + network egress access that is not available in the Ubuntu autopkgtest |
589 | + farm. |
590 | + - SECURITY UPDATE: DoS via malformed packets |
591 | + + d/p/CVE-2019-6471.patch: fix race condition in lib/dns/dispatch.c |
592 | + + CVE-2019-6471 |
593 | + |
594 | + -- Rafael David Tinoco <rafaeldtinoco@ubuntu.com> Fri, 21 Jun 2019 18:06:22 +0000 |
595 | + |
596 | +bind9 (1:9.11.5.P4+dfsg-4ubuntu2) eoan; urgency=medium |
597 | + |
598 | + * SECURITY UPDATE: DoS via malformed packets |
599 | + - debian/patches/CVE-2019-6471.patch: fix race condition in |
600 | + lib/dns/dispatch.c. |
601 | + - CVE-2019-6471 |
602 | + |
603 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 20 Jun 2019 08:15:00 -0400 |
604 | + |
605 | +bind9 (1:9.11.5.P4+dfsg-4ubuntu1) eoan; urgency=medium |
606 | + |
607 | + * Merge with Debian unstable. Remaining changes: |
608 | + - Build without lmdb support as that package is in Universe |
609 | + - Don't build dnstap as it depends on universe packages: |
610 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
611 | + protobuf-c-compiler (universe packages) |
612 | + + d/dnsutils.install: don't install dnstap |
613 | + + d/libdns1104.symbols: don't include dnstap symbols |
614 | + + d/rules: don't build dnstap nor install dnstap.proto |
615 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
616 | + option (LP #1804648) |
617 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
618 | + close to a query timeout (LP #1797926) |
619 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
620 | + network egress access that is not available in the Ubuntu autopkgtest |
621 | + farm. |
622 | + * Dropped: |
623 | + - SECURITY UPDATE: memory leak via specially crafted packet |
624 | + + debian/patches/CVE-2018-5744.patch: silently drop additional keytag |
625 | + options in bin/named/client.c. |
626 | + + CVE-2018-5744 |
627 | + [Fixed upstream in 9.11.5-P2] |
628 | + - SECURITY UPDATE: assertion failure when a trust anchor rolls over to an |
629 | + unsupported key algorithm when using managed-keys |
630 | + + debian/patches/CVE-2018-5745.patch: properly handle situations when |
631 | + the key tag cannot be computed in lib/dns/include/dst/dst.h, |
632 | + lib/dns/zone.c. |
633 | + + CVE-2018-5745 |
634 | + [Fixed upstream in 9.11.5-P2] |
635 | + - SECURITY UPDATE: Controls for zone transfers may not be properly |
636 | + applied to Dynamically Loadable Zones (DLZs) if the zones are writable |
637 | + + debian/patches/CVE-2019-6465.patch: handle zone transfers marked in |
638 | + the zone table as a DLZ zone bin/named/xfrout.c. |
639 | + + CVE-2019-6465 |
640 | + [Fixed upstream in 9.11.5-P3] |
641 | + - SECURITY UPDATE: limiting simultaneous TCP clients is ineffective |
642 | + + debian/patches/CVE-2018-5743.patch: add reference counting in |
643 | + bin/named/client.c, bin/named/include/named/client.h, |
644 | + bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c, |
645 | + lib/isc/include/isc/quota.h, lib/isc/quota.c, |
646 | + lib/isc/win32/libisc.def.in. |
647 | + + debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic |
648 | + operations with isc_refcount reference counting in |
649 | + bin/named/client.c, bin/named/include/named/interfacemgr.h, |
650 | + bin/named/interfacemgr.c. |
651 | + + debian/libisc1100.symbols: added new symbols. |
652 | + + CVE-2018-5743 |
653 | + [Fixed in 1:9.11.5.P4+dfsg-4] |
654 | + - d/rules: add back EdDSA support (LP #1825712) |
655 | + [Fixed in 1:9.11.5.P4+dfsg-4] |
656 | + |
657 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 02 May 2019 13:35:59 -0300 |
658 | + |
659 | +bind9 (1:9.11.5.P1+dfsg-1ubuntu4) eoan; urgency=medium |
660 | + |
661 | + * d/rules: add back EdDSA support (LP: #1825712) |
662 | + |
663 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 26 Apr 2019 14:04:37 +0000 |
664 | + |
665 | +bind9 (1:9.11.5.P1+dfsg-1ubuntu3) eoan; urgency=medium |
666 | + |
667 | + * SECURITY UPDATE: limiting simultaneous TCP clients is ineffective |
668 | + - debian/patches/CVE-2018-5743.patch: add reference counting in |
669 | + bin/named/client.c, bin/named/include/named/client.h, |
670 | + bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c, |
671 | + lib/isc/include/isc/quota.h, lib/isc/quota.c, |
672 | + lib/isc/win32/libisc.def.in. |
673 | + - debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic |
674 | + operations with isc_refcount reference counting in |
675 | + bin/named/client.c, bin/named/include/named/interfacemgr.h, |
676 | + bin/named/interfacemgr.c. |
677 | + - debian/libisc1100.symbols: added new symbols. |
678 | + - CVE-2018-5743 |
679 | + |
680 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 24 Apr 2019 05:00:07 -0400 |
681 | + |
682 | +bind9 (1:9.11.5.P1+dfsg-1ubuntu2) disco; urgency=medium |
683 | + |
684 | + * SECURITY UPDATE: memory leak via specially crafted packet |
685 | + - debian/patches/CVE-2018-5744.patch: silently drop additional keytag |
686 | + options in bin/named/client.c. |
687 | + - CVE-2018-5744 |
688 | + * SECURITY UPDATE: assertion failure when a trust anchor rolls over to an |
689 | + unsupported key algorithm when using managed-keys |
690 | + - debian/patches/CVE-2018-5745.patch: properly handle situations when |
691 | + the key tag cannot be computed in lib/dns/include/dst/dst.h, |
692 | + lib/dns/zone.c. |
693 | + - CVE-2018-5745 |
694 | + * SECURITY UPDATE: Controls for zone transfers may not be properly |
695 | + applied to Dynamically Loadable Zones (DLZs) if the zones are writable |
696 | + - debian/patches/CVE-2019-6465.patch: handle zone transfers marked in |
697 | + the zone table as a DLZ zone bin/named/xfrout.c. |
698 | + - CVE-2019-6465 |
699 | + |
700 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 22 Feb 2019 10:52:30 +0100 |
701 | + |
702 | +bind9 (1:9.11.5.P1+dfsg-1ubuntu1) disco; urgency=medium |
703 | + |
704 | + * Merge with Debian unstable. Remaining changes: |
705 | + - Build without lmdb support as that package is in Universe |
706 | + - Don't build dnstap as it depends on universe packages: |
707 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
708 | + protobuf-c-compiler (universe packages) |
709 | + + d/dnsutils.install: don't install dnstap |
710 | + + d/libdns1104.symbols: don't include dnstap symbols |
711 | + + d/rules: don't build dnstap nor install dnstap.proto |
712 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
713 | + option (LP #1804648) |
714 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
715 | + close to a query timeout (LP #1797926) |
716 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
717 | + network egress access that is not available in the Ubuntu autopkgtest |
718 | + farm. |
719 | + |
720 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Jan 2019 18:59:25 -0200 |
721 | + |
722 | +bind9 (1:9.11.5+dfsg-1ubuntu1) disco; urgency=medium |
723 | + |
724 | + * Merge with Debian unstable. Remaining changes: |
725 | + - Build without lmdb support as that package is in Universe |
726 | + - Don't build dnstap as it depends on universe packages: |
727 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
728 | + protobuf-c-compiler (universe packages) |
729 | + + d/dnsutils.install: don't install dnstap |
730 | + + d/libdns1104.symbols: don't include dnstap symbols |
731 | + + d/rules: don't build dnstap nor install dnstap.proto |
732 | + * Dropped: |
733 | + - SECURITY UPDATE: denial of service crash when deny-answer-aliases |
734 | + option is used |
735 | + + debian/patches/CVE-2018-5740-1.patch: explicit DNAME query could |
736 | + trigger a crash if deny-answer-aliases was set |
737 | + + debian/patches/CVE-2018-5740-2.patch: add tests |
738 | + + debian/patches/CVE-2018-5740-3.patch: caclulate nlabels and set |
739 | + chainingp correctly, add test |
740 | + + CVE-2018-5740 |
741 | + [Fixed in new upstream version 9.11.5] |
742 | + - d/extras/apparmor.d/usr.sbin.named: add missing comma at the end of the |
743 | + line (Closes: #904983) |
744 | + [Fixed in 1:9.11.4+dfsg-4] |
745 | + - Add a patch to fix named-pkcs11 crashing on startup. (LP #1769440) |
746 | + [Fixed in 1:9.11.4.P1+dfsg-1] |
747 | + - Cherrypick from debian: Add new dst__openssleddsa_init optional symbol |
748 | + (it depends on OpenSSL version) (Closes: #897643) |
749 | + [Fixed in 1:9.11.4.P1+dfsg-1] |
750 | + * Added: |
751 | + - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line |
752 | + option (LP: #1804648) |
753 | + - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted |
754 | + close to a query timeout (LP: #1797926) |
755 | + - d/t/simpletest: drop the internetsociety.org test as it requires |
756 | + network egress access that is not available in the Ubuntu autopkgtest |
757 | + farm. |
758 | + |
759 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 13 Dec 2018 19:40:23 -0200 |
760 | + |
761 | +bind9 (1:9.11.4+dfsg-3ubuntu5) cosmic; urgency=high |
762 | + |
763 | + * No change rebuild against openssl 1.1.1 with TLS 1.3 support. |
764 | + |
765 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Sat, 29 Sep 2018 01:36:45 +0100 |
766 | + |
767 | +bind9 (1:9.11.4+dfsg-3ubuntu4) cosmic; urgency=medium |
768 | + |
769 | + * SECURITY UPDATE: denial of service crash when deny-answer-aliases |
770 | + option is used |
771 | + - debian/patches/CVE-2018-5740-1.patch: explicit DNAME query could |
772 | + trigger a crash if deny-answer-aliases was set |
773 | + - debian/patches/CVE-2018-5740-2.patch: add tests |
774 | + - debian/patches/CVE-2018-5740-3.patch: caclulate nlabels and set |
775 | + chainingp correctly, add test |
776 | + - CVE-2018-5740 |
777 | + |
778 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 20 Sep 2018 11:11:05 +0200 |
779 | + |
780 | +bind9 (1:9.11.4+dfsg-3ubuntu3) cosmic; urgency=medium |
781 | + |
782 | + * Cherrypick from debian: Add new dst__openssleddsa_init optional symbol |
783 | + (it depends on OpenSSL version) (Closes: #897643) |
784 | + |
785 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 18 Sep 2018 10:39:12 +0200 |
786 | + |
787 | +bind9 (1:9.11.4+dfsg-3ubuntu2) cosmic; urgency=medium |
788 | + |
789 | + * d/p/skip-rtld-deepbind-for-dyndb.diff: Add a patch to fix named-pkcs11 |
790 | + crashing on startup. (LP: #1769440) |
791 | + |
792 | + -- Karl Stenerud <karl.stenerud@canonical.com> Thu, 30 Aug 2018 07:11:39 -0700 |
793 | + |
794 | +bind9 (1:9.11.4+dfsg-3ubuntu1) cosmic; urgency=medium |
795 | + |
796 | + * Merge with Debian unstable. Remaining changes: |
797 | + - Build without lmdb support as that package is in Universe |
798 | + * Added: |
799 | + - Don't build dnstap as it depends on universe packages: |
800 | + + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and |
801 | + protobuf-c-compiler (universe packages) |
802 | + + d/dnsutils.install: don't install dnstap |
803 | + + d/libdns1102.symbols: don't include dnstap symbols |
804 | + + d/rules: don't build dnstap |
805 | + - d/extras/apparmor.d/usr.sbin.named: add missing comma at the end of the |
806 | + line (Closes: #904983) |
807 | + |
808 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 30 Jul 2018 10:56:04 -0300 |
809 | + |
810 | +bind9 (1:9.11.3+dfsg-2ubuntu1) cosmic; urgency=medium |
811 | + |
812 | + * Merge with Debian unstable (LP: #1777935). Remaining changes: |
813 | + - Build without lmdb support as that package is in Universe |
814 | + * Drop: |
815 | + - SECURITY UPDATE: improperly permits recursive query service |
816 | + + debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling |
817 | + in bin/named/server.c. |
818 | + + CVE-2018-5738 |
819 | + [Applied in Debian's 1:9.11.3+dfsg-2] |
820 | + |
821 | + -- Andreas Hasenack <andreas@canonical.com> Wed, 20 Jun 2018 17:42:16 -0300 |
822 | + |
823 | +bind9 (1:9.11.3+dfsg-1ubuntu2) cosmic; urgency=medium |
824 | + |
825 | + * SECURITY UPDATE: improperly permits recursive query service |
826 | + - debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling |
827 | + in bin/named/server.c. |
828 | + - CVE-2018-5738 |
829 | + |
830 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 11 Jun 2018 09:41:51 -0400 |
831 | + |
832 | +bind9 (1:9.11.3+dfsg-1ubuntu1) bionic; urgency=low |
833 | + |
834 | + * New upstream release. (LP: #1763572) |
835 | + - fix a crash when configured with ipa-dns-install |
836 | + * Merge from Debian unstable. Remaining changes: |
837 | + - Build without lmdb support as that package is in Universe |
838 | + |
839 | + -- Timo Aaltonen <tjaalton@debian.org> Fri, 13 Apr 2018 07:40:47 +0300 |
840 | + |
841 | +bind9 (1:9.11.2.P1-1ubuntu5) bionic; urgency=medium |
842 | + |
843 | + * debian/patches/nsupdate-gssapi-fails-ad-45854.patch: fix updating |
844 | + DNS records in Microsoft AD using GSSAPI. Thanks to Mark Andrews |
845 | + <marka@isc.org>. (LP: #1755439) |
846 | + |
847 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Mar 2018 09:38:46 -0300 |
848 | + |
849 | +bind9 (1:9.11.2.P1-1ubuntu4) bionic; urgency=medium |
850 | + |
851 | + * Fix apparmor profile filename (LP: #1754981) |
852 | + |
853 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 15 Mar 2018 10:06:57 -0300 |
854 | + |
855 | +bind9 (1:9.11.2.P1-1ubuntu3) bionic; urgency=high |
856 | + |
857 | + * No change rebuild against openssl1.1. |
858 | + |
859 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 06 Feb 2018 12:14:22 +0000 |
860 | + |
861 | +bind9 (1:9.11.2.P1-1ubuntu2) bionic; urgency=medium |
862 | + |
863 | + * Build without lmdb support as that package is in Universe (LP: #1746296) |
864 | + - d/control: remove Build-Depends on liblmdb-dev |
865 | + - d/rules: configure --without-lmdb |
866 | + - d/bind9.install: drop named-nzd2nzf and named-nzd2nzf.8 as it requires |
867 | + lmdb. |
868 | + |
869 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 30 Jan 2018 15:21:23 -0200 |
870 | + |
871 | +bind9 (1:9.11.2.P1-1ubuntu1) bionic; urgency=medium |
872 | + |
873 | + * Merge with Debian unstable (LP: #1744930). |
874 | + * Drop: |
875 | + - Add RemainAfterExit to bind9-resolvconf unit configuration file |
876 | + (LP #1536181). |
877 | + [fixed in 1:9.10.6+dfsg-4] |
878 | + - rules: Fix path to libsofthsm2.so. (LP #1685780) |
879 | + [adopted in 1:9.10.6+dfsg-5] |
880 | + - d/p/CVE-2016-8864-regression-test.patch: tests for the regression |
881 | + introduced with the CVE-2016-8864.patch and fixed in |
882 | + CVE-2016-8864-regression.patch. |
883 | + [applied upstream] |
884 | + - d/p/CVE-2016-8864-regression2-test.patch: tests for the second |
885 | + regression (RT #44318) introduced with the CVE-2016-8864.patch |
886 | + and fixed in CVE-2016-8864-regression2.patch. |
887 | + [applied upstream] |
888 | + - d/control, d/rules: add json support for the statistics channels. |
889 | + (LP #1669193) |
890 | + [adopted in 1:9.10.6+dfsg-5] |
891 | + * d/p/add-ply-dependency-to-python-scripts.patch: setup.py is missing |
892 | + listing the python ply module as a dependency (Closes: #888463) |
893 | + |
894 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 26 Jan 2018 11:20:33 -0200 |
895 | + |
896 | bind9 (1:9.11.2.P1-1) unstable; urgency=medium |
897 | |
898 | * New upstream version 9.11.2-P1 |
899 | @@ -559,6 +1331,140 @@ bind9 (1:9.10.6+dfsg-1) unstable; urgency=medium |
900 | |
901 | -- Ondřej Surý <ondrej@debian.org> Fri, 06 Oct 2017 06:18:21 +0000 |
902 | |
903 | +bind9 (1:9.10.3.dfsg.P4-12.6ubuntu1) artful; urgency=medium |
904 | + |
905 | + * Merge with Debian unstable (LP: #1712920). Remaining changes: |
906 | + - Add RemainAfterExit to bind9-resolvconf unit configuration file |
907 | + (LP #1536181). |
908 | + - rules: Fix path to libsofthsm2.so. (LP #1685780) |
909 | + - d/p/CVE-2016-8864-regression-test.patch: tests for the regression |
910 | + introduced with the CVE-2016-8864.patch and fixed in |
911 | + CVE-2016-8864-regression.patch. |
912 | + - d/p/CVE-2016-8864-regression2-test.patch: tests for the second |
913 | + regression (RT #44318) introduced with the CVE-2016-8864.patch |
914 | + and fixed in CVE-2016-8864-regression2.patch. |
915 | + - d/control, d/rules: add json support for the statistics channels. |
916 | + (LP #1669193) |
917 | + |
918 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 24 Aug 2017 18:28:00 -0300 |
919 | + |
920 | +bind9 (1:9.10.3.dfsg.P4-12.6) unstable; urgency=medium |
921 | + |
922 | + * Non-maintainer upload. |
923 | + * Import upcoming DNSSEC KSK-2017 from 9.10.5 (Closes: #860794) |
924 | + |
925 | + -- Bernhard Schmidt <berni@debian.org> Fri, 11 Aug 2017 19:10:07 +0200 |
926 | + |
927 | +bind9 (1:9.10.3.dfsg.P4-12.5ubuntu1) artful; urgency=medium |
928 | + |
929 | + * Merge with Debian unstable (LP: #1701687). Remaining changes: |
930 | + - Add RemainAfterExit to bind9-resolvconf unit configuration file |
931 | + (LP #1536181). |
932 | + - rules: Fix path to libsofthsm2.so. (LP #1685780) |
933 | + * Drop: |
934 | + - SECURITY UPDATE: denial of service via assertion failure |
935 | + + debian/patches/CVE-2016-2776.patch: properly handle lengths in |
936 | + lib/dns/message.c. |
937 | + + CVE-2016-2776 |
938 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-11] |
939 | + - SECURITY UPDATE: assertion failure via class mismatch |
940 | + + debian/patches/CVE-2016-9131.patch: properly handle certain TKEY |
941 | + records in lib/dns/resolver.c. |
942 | + + CVE-2016-9131 |
943 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-11] |
944 | + - SECURITY UPDATE: assertion failure via inconsistent DNSSEC information |
945 | + + debian/patches/CVE-2016-9147.patch: fix logic when records are |
946 | + returned without the requested data in lib/dns/resolver.c. |
947 | + + CVE-2016-9147 |
948 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-11] |
949 | + - SECURITY UPDATE: assertion failure via unusually-formed DS record |
950 | + + debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in |
951 | + lib/dns/message.c, lib/dns/resolver.c. |
952 | + + CVE-2016-9444 |
953 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-11] |
954 | + - SECURITY UPDATE: regression in CVE-2016-8864 |
955 | + + debian/patches/rt43779.patch: properly handle CNAME -> DNAME in |
956 | + responses in lib/dns/resolver.c, added tests to |
957 | + bin/tests/system/dname/ns2/example.db, |
958 | + bin/tests/system/dname/tests.sh. |
959 | + + No CVE number |
960 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-11 and 1:9.10.3.dfsg.P4-12] |
961 | + - SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing |
962 | + a NULL pointer |
963 | + + debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz |
964 | + combination in bin/named/query.c, lib/dns/message.c, |
965 | + lib/dns/rdataset.c. |
966 | + + CVE-2017-3135 |
967 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12] |
968 | + - SECURITY UPDATE: regression in CVE-2016-8864 |
969 | + + debian/patches/rt44318.patch: synthesised CNAME before matching DNAME |
970 | + was still being cached when it should have been in lib/dns/resolver.c, |
971 | + added tests to bin/tests/system/dname/ans3/ans.pl, |
972 | + bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh. |
973 | + + No CVE number |
974 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12] |
975 | + - SECURITY UPDATE: Denial of Service due to an error handling |
976 | + synthesized records when using DNS64 with "break-dnssec yes;" |
977 | + + debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64() |
978 | + called. |
979 | + + CVE-2017-3136 |
980 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3] |
981 | + - SECURITY UPDATE: Denial of Service due to resolver terminating when |
982 | + processing a response packet containing a CNAME or DNAME |
983 | + + debian/patches/CVE-2017-3137.patch: don't expect a specific |
984 | + ordering of answer components; add testcases. |
985 | + + CVE-2017-3137 |
986 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3 with 3 patch files] |
987 | + - SECURITY UPDATE: Denial of Service when receiving a null command on |
988 | + the control channel |
989 | + + debian/patches/CVE-2017-3138.patch: don't throw an assert if no |
990 | + command token is given; add testcase. |
991 | + + CVE-2017-3138 |
992 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3] |
993 | + - SECURITY UPDATE: TSIG authentication issues |
994 | + + debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in |
995 | + lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c. |
996 | + + CVE-2017-3142 |
997 | + + CVE-2017-3143 |
998 | + + [Fixed in Debian 1:9.10.3.dfsg.P4-12.4] |
999 | + * d/p/CVE-2016-8864-regression-test.patch: tests for the regression |
1000 | + introduced with the CVE-2016-8864.patch and fixed in |
1001 | + CVE-2016-8864-regression.patch. |
1002 | + * d/p/CVE-2016-8864-regression2-test.patch: tests for the second |
1003 | + regression (RT #44318) introduced with the CVE-2016-8864.patch |
1004 | + and fixed in CVE-2016-8864-regression2.patch. |
1005 | + * d/control, d/rules: add json support for the statistics channels. |
1006 | + (LP: #1669193) |
1007 | + |
1008 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 11 Aug 2017 17:12:09 -0300 |
1009 | + |
1010 | +bind9 (1:9.10.3.dfsg.P4-12.5) unstable; urgency=medium |
1011 | + |
1012 | + * Non-maintainer upload. |
1013 | + * Change to fix CVE-2017-3142 and CVE-2017-3143 broke verification of TSIG |
1014 | + signed TCP message sequences where not all the messages contain TSIG |
1015 | + records. These may be used in AXFR and IXFR responses. |
1016 | + (Closes: #868952) |
1017 | + |
1018 | + -- Salvatore Bonaccorso <carnil@debian.org> Fri, 21 Jul 2017 22:28:32 +0200 |
1019 | + |
1020 | +bind9 (1:9.10.3.dfsg.P4-12.4) unstable; urgency=high |
1021 | + |
1022 | + * Non-maintainer upload. |
1023 | + |
1024 | + [ Yves-Alexis Perez ] |
1025 | + * debian/patches: |
1026 | + - debian/patches/CVE-2017-3142+CVE-2017-3143 added, fix TSIG bypasses |
1027 | + CVE-2017-3142: error in TSIG authentication can permit unauthorized zone |
1028 | + transfers. An attacker may be able to circumvent TSIG authentication of |
1029 | + AXFR and Notify requests. |
1030 | + CVE-2017-3143: error in TSIG authentication can permit unauthorized |
1031 | + dynamic updates. An attacker may be able to forge a valid TSIG or SIG(0) |
1032 | + signature for a dynamic update. |
1033 | + (Closes: #866564) |
1034 | + |
1035 | + -- Salvatore Bonaccorso <carnil@debian.org> Sun, 16 Jul 2017 22:13:21 +0200 |
1036 | + |
1037 | bind9 (1:9.10.3.dfsg.P4-12.3+deb9u3) stretch; urgency=medium |
1038 | |
1039 | [ Bernhard Schmidt ] |
1040 | @@ -665,6 +1571,98 @@ bind9 (1:9.10.3.dfsg.P4-11) unstable; urgency=medium |
1041 | |
1042 | -- Michael Gilbert <mgilbert@debian.org> Thu, 19 Jan 2017 04:03:28 +0000 |
1043 | |
1044 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu7) artful; urgency=medium |
1045 | + |
1046 | + * SECURITY UPDATE: TSIG authentication issues |
1047 | + - debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in |
1048 | + lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c. |
1049 | + - CVE-2017-3142 |
1050 | + - CVE-2017-3143 |
1051 | + |
1052 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 03 Jul 2017 09:48:13 -0400 |
1053 | + |
1054 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu6) artful; urgency=medium |
1055 | + |
1056 | + * rules: Fix path to libsofthsm2.so. (LP: #1685780) |
1057 | + |
1058 | + -- Timo Aaltonen <tjaalton@debian.org> Mon, 24 Apr 2017 15:01:30 +0300 |
1059 | + |
1060 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu5) zesty-security; urgency=medium |
1061 | + |
1062 | + * SECURITY UPDATE: Denial of Service due to an error handling |
1063 | + synthesized records when using DNS64 with "break-dnssec yes;" |
1064 | + - debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64() |
1065 | + called. |
1066 | + - CVE-2017-3136 |
1067 | + * SECURITY UPDATE: Denial of Service due to resolver terminating when |
1068 | + processing a response packet containing a CNAME or DNAME |
1069 | + - debian/patches/CVE-2017-3137.patch: don't expect a specific |
1070 | + ordering of answer components; add testcases. |
1071 | + - CVE-2017-3137 |
1072 | + * SECURITY UPDATE: Denial of Service when receiving a null command on |
1073 | + the control channel |
1074 | + - debian/patches/CVE-2017-3138.patch: don't throw an assert if no |
1075 | + command token is given; add testcase. |
1076 | + - CVE-2017-3138 |
1077 | + |
1078 | + -- Steve Beattie <sbeattie@ubuntu.com> Wed, 12 Apr 2017 01:32:15 -0700 |
1079 | + |
1080 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu4) zesty; urgency=medium |
1081 | + |
1082 | + * SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing |
1083 | + a NULL pointer |
1084 | + - debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz |
1085 | + combination in bin/named/query.c, lib/dns/message.c, |
1086 | + lib/dns/rdataset.c. |
1087 | + - CVE-2017-3135 |
1088 | + * SECURITY UPDATE: regression in CVE-2016-8864 |
1089 | + - debian/patches/rt44318.patch: synthesised CNAME before matching DNAME |
1090 | + was still being cached when it should have been in lib/dns/resolver.c, |
1091 | + added tests to bin/tests/system/dname/ans3/ans.pl, |
1092 | + bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh. |
1093 | + - No CVE number |
1094 | + |
1095 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 15 Feb 2017 09:37:39 -0500 |
1096 | + |
1097 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu3) zesty; urgency=medium |
1098 | + |
1099 | + * SECURITY UPDATE: assertion failure via class mismatch |
1100 | + - debian/patches/CVE-2016-9131.patch: properly handle certain TKEY |
1101 | + records in lib/dns/resolver.c. |
1102 | + - CVE-2016-9131 |
1103 | + * SECURITY UPDATE: assertion failure via inconsistent DNSSEC information |
1104 | + - debian/patches/CVE-2016-9147.patch: fix logic when records are |
1105 | + returned without the requested data in lib/dns/resolver.c. |
1106 | + - CVE-2016-9147 |
1107 | + * SECURITY UPDATE: assertion failure via unusually-formed DS record |
1108 | + - debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in |
1109 | + lib/dns/message.c, lib/dns/resolver.c. |
1110 | + - CVE-2016-9444 |
1111 | + * SECURITY UPDATE: regression in CVE-2016-8864 |
1112 | + - debian/patches/rt43779.patch: properly handle CNAME -> DNAME in |
1113 | + responses in lib/dns/resolver.c, added tests to |
1114 | + bin/tests/system/dname/ns2/example.db, |
1115 | + bin/tests/system/dname/tests.sh. |
1116 | + - No CVE number |
1117 | + |
1118 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 25 Jan 2017 09:28:10 -0500 |
1119 | + |
1120 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu2) zesty; urgency=medium |
1121 | + |
1122 | + * Add RemainAfterExit to bind9-resolvconf unit configuration file |
1123 | + (LP: #1536181). |
1124 | + |
1125 | + -- Nishanth Aravamudan <nish.aravamudan@canonical.com> Tue, 15 Nov 2016 08:24:58 -0800 |
1126 | + |
1127 | +bind9 (1:9.10.3.dfsg.P4-10.1ubuntu1) yakkety; urgency=medium |
1128 | + |
1129 | + * SECURITY UPDATE: denial of service via assertion failure |
1130 | + - debian/patches/CVE-2016-2776.patch: properly handle lengths in |
1131 | + lib/dns/message.c. |
1132 | + - CVE-2016-2776 |
1133 | + |
1134 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 04 Oct 2016 14:31:17 -0400 |
1135 | + |
1136 | bind9 (1:9.10.3.dfsg.P4-10.1) unstable; urgency=medium |
1137 | |
1138 | * Non-maintainer upload. |
1139 | diff --git a/debian/control b/debian/control |
1140 | index b6f7ecd..adf5ada 100644 |
1141 | --- a/debian/control |
1142 | +++ b/debian/control |
1143 | @@ -1,32 +1,31 @@ |
1144 | Source: bind9 |
1145 | Section: net |
1146 | Priority: optional |
1147 | -Maintainer: Debian DNS Team <team+dns@tracker.debian.org> |
1148 | +Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
1149 | +XSBC-Original-Maintainer: Debian DNS Team <team+dns@tracker.debian.org> |
1150 | Uploaders: Ondřej Surý <ondrej@debian.org>, |
1151 | Bernhard Schmidt <berni@debian.org> |
1152 | Build-Depends: bison, |
1153 | debhelper-compat (= 12), |
1154 | dh-apparmor, |
1155 | + dh-apport, |
1156 | dh-exec, |
1157 | dh-python, |
1158 | libcap2-dev [linux-any], |
1159 | libcmocka-dev, |
1160 | libdb-dev, |
1161 | libedit-dev, |
1162 | - libfstrm-dev, |
1163 | libidn2-dev, |
1164 | libjson-c-dev, |
1165 | libkrb5-dev, |
1166 | libldap2-dev, |
1167 | liblmdb-dev, |
1168 | libmaxminddb-dev (>= 1.3.0), |
1169 | - libprotobuf-c-dev, |
1170 | libssl-dev, |
1171 | libtool, |
1172 | libuv1-dev, |
1173 | libxml2-dev, |
1174 | pkg-config, |
1175 | - protobuf-c-compiler, |
1176 | python3, |
1177 | python3-ply, |
1178 | zlib1g-dev |
1179 | diff --git a/debian/rules b/debian/rules |
1180 | index 0fca88b..54ed8d6 100755 |
1181 | --- a/debian/rules |
1182 | +++ b/debian/rules |
1183 | @@ -29,7 +29,7 @@ SED_VERSION_EXTENSIONS := \ |
1184 | sed -e 's,^EXTENSIONS=,EXTENSIONS="$$(dpkg-parsechangelog --file=../debian/changelog | sed -n '/^Version/s/[^-]*//p')-$$(dpkg-vendor --query Vendor)",' |
1185 | |
1186 | %: |
1187 | - dh $@ --with python3 |
1188 | + dh $@ --with python3,apport |
1189 | |
1190 | prepare_version_extensions: |
1191 | if [ ! -f version.bak ]; then \ |
1192 | @@ -60,7 +60,7 @@ override_dh_auto_configure: |
1193 | --with-openssl=/usr \ |
1194 | --with-gssapi=/usr \ |
1195 | --with-libidn2 \ |
1196 | - --with-libjson-c \ |
1197 | + --with-json-c \ |
1198 | --with-lmdb=/usr \ |
1199 | --with-gnu-ld \ |
1200 | --with-maxminddb \ |
1201 | @@ -69,7 +69,6 @@ override_dh_auto_configure: |
1202 | --enable-rrl \ |
1203 | --enable-filter-aaaa \ |
1204 | --disable-native-pkcs11 \ |
1205 | - --enable-dnstap \ |
1206 | $(EXTRA_FEATURES) |
1207 | |
1208 | override_dh_auto_build: |
1209 | diff --git a/debian/tests/control b/debian/tests/control |
1210 | index 3e952eb..35b7572 100644 |
1211 | --- a/debian/tests/control |
1212 | +++ b/debian/tests/control |
1213 | @@ -1,4 +1,4 @@ |
1214 | Tests: simpletest |
1215 | Restrictions: needs-root, isolation-container |
1216 | Depends: bind9, |
1217 | - dnsutils |
1218 | + bind9-dnsutils |
1219 | diff --git a/debian/tests/simpletest b/debian/tests/simpletest |
1220 | index 468a7c5..34b0b25 100644 |
1221 | --- a/debian/tests/simpletest |
1222 | +++ b/debian/tests/simpletest |
1223 | @@ -10,10 +10,6 @@ setup() { |
1224 | run() { |
1225 | # Make a query against a local zone |
1226 | dig -x 127.0.0.1 @127.0.0.1 |
1227 | - |
1228 | - # Make a query against an external nameserver and check for DNSSEC validation |
1229 | - echo "Checking for DNSSEC validation status of internetsociety.org" |
1230 | - dig -t a internetsociety.org @127.0.0.1 | egrep 'flags:.+ad; QUERY' |
1231 | } |
1232 | |
1233 | teardown() { |
DEP passes, but it's really a simple test:
autopkgtest [11:33:13]: test simpletest: - - - - - - - - - - results - - - - - - - - - - @@@@@@@ @@@@@@ summary
simpletest PASS
autopkgtest [11:33:14]: @@@@@@@
simpletest PASS
;)