Merge ~ahasenack/ubuntu/+source/bind9:groovy-bind-9166-3-merge into ubuntu/+source/bind9:debian/sid

Proposed by Andreas Hasenack
Status: Merged
Approved by: Andreas Hasenack
Approved revision: c031cd2b77032956bc2eb25f7fc35cb9e69a7c9b
Merge reported by: Christian Ehrhardt 
Merged at revision: c031cd2b77032956bc2eb25f7fc35cb9e69a7c9b
Proposed branch: ~ahasenack/ubuntu/+source/bind9:groovy-bind-9166-3-merge
Merge into: ubuntu/+source/bind9:debian/sid
Diff against target: 1233 lines (+1052/-14)
8 files modified
debian/NEWS (+24/-0)
debian/bind9-dnsutils.install (+0/-2)
debian/bind9.apport (+24/-0)
debian/changelog (+998/-0)
debian/control (+3/-4)
debian/rules (+2/-3)
debian/tests/control (+1/-1)
debian/tests/simpletest (+0/-4)
Reviewer Review Type Date Requested Status
Christian Ehrhardt  (community) Approve
Canonical Server Pending
Review via email: mp+390746@code.launchpad.net

Description of the change

Quick merge from debian to grab to assertion fixes from upstream, and a systemd service change to restart the daemon if it fails.

Of these, *maybe* the systemd change qualifies for an FFe? But I think not.

PPA with proposed and all arches enabled: https://launchpad.net/~ahasenack/+archive/ubuntu/bind-9116-3-merge (still building)

To post a comment you must log in.
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

DEP passes, but it's really a simple test:

autopkgtest [11:33:13]: test simpletest: - - - - - - - - - - results - - - - - - - - - -
simpletest PASS
autopkgtest [11:33:14]: @@@@@@@@@@@@@@@@@@@@ summary
simpletest PASS

;)

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

To install from the ppa, you will have to enable proposed, as bind9 in the ppa built with the new glibc already.

A quick test is to run systemctl status bind9, then sudo kill <bind9-pid>, and run status again. The daemon from the previous package will remain dead, and the one from the new package will be automatically restarted.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Actually just two changes:

   4 * Add upstream patches to fix some rare conditions (Closes: #969448)
=> OK

   7 * Set Restart=on-failure in systemd unit

There was unfortunately no bug referencedthat discussed this, but still so many other services do that and also systemd has rate limiting for restarts.
Bind9 is not known to fatally run into problems when restarted - and having it back up sounds good fur such a core service right.
This should be safe without FFe IMHO.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

    ++ - d/not-installed: list dnstap-read.1 manpage, which is being
    ++ installed by the makefile even when dnstap is disabled.
    ++ [Fixed upstream]

That must be disabled a bit longer then, since we didn't change upstream code right?
The build shows no complains about it anymore - so ok

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

The changelog looks good and
$ git range-diff pkg/import/1%9.16.6-2..pkg/upload/1%9.16.6-2ubuntu1 pkg/import/1%9.16.6-3..ahasenack/groovy-bind-9166-3-merge

Agrees on this being otherwise delta retained as-is.

+1

review: Approve
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

> Actually just two changes:
>
> 4 * Add upstream patches to fix some rare conditions (Closes: #969448)
> => OK
>
> 7 * Set Restart=on-failure in systemd unit
>
>
> There was unfortunately no bug referencedthat discussed this, but still so
> many other services do that and also systemd has rate limiting for restarts.
> Bind9 is not known to fatally run into problems when restarted - and having it
> back up sounds good fur such a core service right.
> This should be safe without FFe IMHO.

The restart was discussed in tha debian bug, actually. Since bind9 died because of the assertion error, they wondered if restart on-failure shouldn't be set by default:

"""
> It happened again. In the meantime I had added the line
>
> Restart=on-failure
>
> to the [Service] section of /lib/systemd/system/named.service, so the
> name server was automatically restarted.

I wonder whether we should just do this in general. Crashes can and do
happen, no software is error free.

Bernhard
"""

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

> ++ - d/not-installed: list dnstap-read.1 manpage, which is being
> ++ installed by the makefile even when dnstap is disabled.
> ++ [Fixed upstream]
>
> That must be disabled a bit longer then, since we didn't change upstream code
> right?
> The build shows no complains about it anymore - so ok

I dropped d/not-installed in 1:9.16.6-2ubuntu1

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Tagging and uploading c031cd2b77032956bc2eb25f7fc35cb9e69a7c9b

$ git push pkg upload/1%9.16.6-3ubuntu1
Enumerating objects: 52, done.
Counting objects: 100% (52/52), done.
Delta compression using up to 4 threads
Compressing objects: 100% (40/40), done.
Writing objects: 100% (43/43), 12.91 KiB | 322.00 KiB/s, done.
Total 43 (delta 29), reused 6 (delta 3)
To ssh://git.launchpad.net/~usd-import-team/ubuntu/+source/bind9
 * [new tag] upload/1%9.16.6-3ubuntu1 -> upload/1%9.16.6-3ubuntu1

$ dput ubuntu ../bind9_9.16.6-3ubuntu1_source.changes
Checking signature on .changes
gpg: ../bind9_9.16.6-3ubuntu1_source.changes: Valid signature from AC983EB5BF6BCBA9
Checking signature on .dsc
gpg: ../bind9_9.16.6-3ubuntu1.dsc: Valid signature from AC983EB5BF6BCBA9
Uploading to ubuntu (via ftp to upload.ubuntu.com):
  Uploading bind9_9.16.6-3ubuntu1.dsc: done.
  Uploading bind9_9.16.6-3ubuntu1.debian.tar.xz: done.
  Uploading bind9_9.16.6-3ubuntu1_source.buildinfo: done.
  Uploading bind9_9.16.6-3ubuntu1_source.changes: done.
Successfully uploaded packages.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

merged
 bind9 | 1:9.16.6-3ubuntu1 | groovy | source, amd64, arm64, armhf, i386, ppc64el, riscv64, s390x

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/NEWS b/debian/NEWS
2new file mode 100644
3index 0000000..c9348a4
4--- /dev/null
5+++ b/debian/NEWS
6@@ -0,0 +1,24 @@
7+bind9 (1:9.16.0-1ubuntu1) focal; urgency=medium
8+
9+ Some packages like isc-dhcp do not build with bind 9.14 or higher, so a new
10+ source package bind9-libs version 9.11 was created for that purpose,
11+ providing only libraries and header files. The bind9 9.16.x packages do not
12+ provide development libraries or headers. See commit
13+ https://salsa.debian.org/dns-team/bind9-libs/commit/40cab7029d for more
14+ details. udebs used in the debian-installer are also being provided by
15+ bind9-libs.
16+
17+ Another package which doesn't build with the newer bind9 package is
18+ bind-dyndb-ldap. It will build using the libraries from bind9-libs, but
19+ since this is a server plugin, it won't work with the newer server.
20+
21+ Native pkcs#11 support via softhsm2 is no longer being built for this
22+ package. This was first introduced in 1:9.10.3.dfsg.P4-8 (see
23+ https://bugs.launchpad.net/bugs/1565392) for FreeIPA. Ubuntu Focal no longer
24+ ships FreeIPA, and Debian also dropped the native pkcs#11 support.
25+
26+ There are no development libraries or header files in this bind9 9.16.x
27+ packaging at the moment. This may change later, see
28+ https://gitlab.isc.org/isc-projects/bind9/merge_requests/3089#note_111229
29+
30+ -- Andreas Hasenack <andreas@canonical.com> Sat, 22 Feb 2020 17:40:38 -0300
31diff --git a/debian/bind9-dnsutils.install b/debian/bind9-dnsutils.install
32index 90e4fba..5e6b7d9 100644
33--- a/debian/bind9-dnsutils.install
34+++ b/debian/bind9-dnsutils.install
35@@ -1,12 +1,10 @@
36 usr/bin/delv
37 usr/bin/dig
38-usr/bin/dnstap-read
39 usr/bin/mdig
40 usr/bin/nslookup
41 usr/bin/nsupdate
42 usr/share/man/man1/delv.1
43 usr/share/man/man1/dig.1
44-usr/share/man/man1/dnstap-read.1
45 usr/share/man/man1/mdig.1
46 usr/share/man/man1/nslookup.1
47 usr/share/man/man1/nsupdate.1
48diff --git a/debian/bind9.apport b/debian/bind9.apport
49new file mode 100644
50index 0000000..b3baa8b
51--- /dev/null
52+++ b/debian/bind9.apport
53@@ -0,0 +1,24 @@
54+'''apport hook for bind9
55+
56+(c) 2010 Andres Rodriguez.
57+Author: Andres Rodriguez <andreserl@ubuntu.com>
58+
59+This program is free software; you can redistribute it and/or modify it
60+under the terms of the GNU General Public License as published by the
61+Free Software Foundation; either version 2 of the License, or (at your
62+option) any later version. See http://www.gnu.org/copyleft/gpl.html for
63+the full text of the license.
64+'''
65+
66+from apport.hookutils import *
67+import re
68+
69+def add_info(report, ui):
70+
71+ # getting syslog stuff
72+ report['SyslogBind9'] = recent_syslog(re.compile(r'named\['))
73+
74+ # Attaching related packages info
75+ attach_related_packages(report, ['bind9utils', 'apparmor'])
76+
77+ attach_mac_events(report, '/usr/sbin/named')
78diff --git a/debian/changelog b/debian/changelog
79index 6abe704..d6c8a66 100644
80--- a/debian/changelog
81+++ b/debian/changelog
82@@ -1,3 +1,28 @@
83+bind9 (1:9.16.6-3ubuntu1) groovy; urgency=medium
84+
85+ * Merge with Debian unstable. Remaining changes:
86+ - Don't build dnstap as it depends on universe packages:
87+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
88+ protobuf-c-compiler (universe packages)
89+ + d/dnsutils.install: don't install dnstap
90+ + d/libdns1104.symbols: don't include dnstap symbols
91+ + d/rules: don't build dnstap nor install dnstap.proto
92+ - Add back apport:
93+ + d/bind9.apport: add back old bind9 apport hook, but without calling
94+ attach_conffiles() since that is already done by apport itself, with
95+ confirmation from the user.
96+ + d/control, d/rules: buil-depends on dh-apport and use it
97+ - d/t/simpletest: drop the internetsociety.org test as it requires
98+ network egress access that is not available in the Ubuntu autopkgtest
99+ farm.
100+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
101+ - d/t/control: change the dep8 test dependency to be on the real
102+ bind9-dnsutils package, and not the transitional one (LP #1864761)
103+ - d/rules: change deprecated --with-libjson-c configure argument to
104+ --with-json-c
105+
106+ -- Andreas Hasenack <andreas@canonical.com> Tue, 15 Sep 2020 10:46:52 -0300
107+
108 bind9 (1:9.16.6-3) unstable; urgency=medium
109
110 [ Ondřej Surý ]
111@@ -8,6 +33,35 @@ bind9 (1:9.16.6-3) unstable; urgency=medium
112
113 -- Bernhard Schmidt <berni@debian.org> Tue, 15 Sep 2020 00:26:14 +0200
114
115+bind9 (1:9.16.6-2ubuntu1) groovy; urgency=medium
116+
117+ * Merge with Debian unstable. Remaining changes:
118+ - Don't build dnstap as it depends on universe packages:
119+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
120+ protobuf-c-compiler (universe packages)
121+ + d/dnsutils.install: don't install dnstap
122+ + d/libdns1104.symbols: don't include dnstap symbols
123+ + d/rules: don't build dnstap nor install dnstap.proto
124+ - Add back apport:
125+ + d/bind9.apport: add back old bind9 apport hook, but without calling
126+ attach_conffiles() since that is already done by apport itself, with
127+ confirmation from the user.
128+ + d/control, d/rules: buil-depends on dh-apport and use it
129+ - d/t/simpletest: drop the internetsociety.org test as it requires
130+ network egress access that is not available in the Ubuntu autopkgtest
131+ farm.
132+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
133+ - d/t/control: change the dep8 test dependency to be on the real
134+ bind9-dnsutils package, and not the transitional one (LP #1864761)
135+ - d/rules: change deprecated --with-libjson-c configure argument to
136+ --with-json-c
137+ * Dropped:
138+ - d/not-installed: list dnstap-read.1 manpage, which is being
139+ installed by the makefile even when dnstap is disabled.
140+ [Fixed upstream]
141+
142+ -- Andreas Hasenack <andreas@canonical.com> Mon, 24 Aug 2020 10:57:08 -0300
143+
144 bind9 (1:9.16.6-2) unstable; urgency=medium
145
146 * Move Build-Depends for documentation to Build-Depends-Indep, this
147@@ -30,6 +84,51 @@ bind9 (1:9.16.5-1) unstable; urgency=medium
148
149 -- Ondřej Surý <ondrej@debian.org> Thu, 16 Jul 2020 00:29:57 +0200
150
151+bind9 (1:9.16.4-1ubuntu2) groovy; urgency=medium
152+
153+ * No change rebuild against new json-c ABI.
154+
155+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 28 Jul 2020 17:42:17 +0100
156+
157+bind9 (1:9.16.4-1ubuntu1) groovy; urgency=medium
158+
159+ * Merge with Debian unstable. Remaining changes:
160+ - Don't build dnstap as it depends on universe packages:
161+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
162+ protobuf-c-compiler (universe packages)
163+ + d/dnsutils.install: don't install dnstap
164+ + d/libdns1104.symbols: don't include dnstap symbols
165+ + d/rules: don't build dnstap nor install dnstap.proto
166+ - Add back apport:
167+ + d/bind9.apport: add back old bind9 apport hook, but without calling
168+ attach_conffiles() since that is already done by apport itself, with
169+ confirmation from the user.
170+ + d/control, d/rules: buil-depends on dh-apport and use it
171+ - d/t/simpletest: drop the internetsociety.org test as it requires
172+ network egress access that is not available in the Ubuntu autopkgtest
173+ farm.
174+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
175+ - d/t/control: change the dep8 test dependency to be on the real
176+ bind9-dnsutils package, and not the transitional one (LP #1864761)
177+ - d/rules: change deprecated --with-libjson-c configure argument to
178+ --with-json-c
179+ * Dropped:
180+ - SECURITY UPDATE: assertion when attempting to fill oversized TCP buffer
181+ + debian/patches/CVE-2020-8618.patch: add fix to lib/ns/client.c,
182+ lib/ns/include/ns/client.h, lib/ns/xfrout.c.
183+ + CVE-2020-8618
184+ [Fixed upstream]
185+ - SECURITY UPDATE: INSIST failure when a zone with an interior wildcard
186+ label was queried in a certain pattern
187+ + debian/patches/CVE-2020-8619.patch: add fix to lib/dns/rbtdb.c.
188+ + CVE-2020-8619
189+ [Fixed upstream]
190+ * Added changes:
191+ - d/not-installed: list dnstap-read.1 manpage, which is being
192+ installed by the makefile even when dnstap is disabled.
193+
194+ -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Jul 2020 15:22:36 -0300
195+
196 bind9 (1:9.16.4-1) unstable; urgency=medium
197
198 * New upstream version 9.16.4
199@@ -37,12 +136,129 @@ bind9 (1:9.16.4-1) unstable; urgency=medium
200
201 -- Ondřej Surý <ondrej@debian.org> Wed, 17 Jun 2020 09:27:29 +0200
202
203+bind9 (1:9.16.3-1ubuntu2) groovy; urgency=medium
204+
205+ * SECURITY UPDATE: assertion when attempting to fill oversized TCP buffer
206+ - debian/patches/CVE-2020-8618.patch: add fix to lib/ns/client.c,
207+ lib/ns/include/ns/client.h, lib/ns/xfrout.c.
208+ - CVE-2020-8618
209+ * SECURITY UPDATE: INSIST failure when a zone with an interior wildcard
210+ label was queried in a certain pattern
211+ - debian/patches/CVE-2020-8619.patch: add fix to lib/dns/rbtdb.c.
212+ - CVE-2020-8619
213+
214+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 18 Jun 2020 08:29:47 -0400
215+
216+bind9 (1:9.16.3-1ubuntu1) groovy; urgency=medium
217+
218+ * Merge with Debian unstable. Remaining changes:
219+ - Don't build dnstap as it depends on universe packages:
220+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
221+ protobuf-c-compiler (universe packages)
222+ + d/dnsutils.install: don't install dnstap
223+ + d/libdns1104.symbols: don't include dnstap symbols
224+ + d/rules: don't build dnstap nor install dnstap.proto
225+ - Add back apport:
226+ + d/bind9.apport: add back old bind9 apport hook, but without calling
227+ attach_conffiles() since that is already done by apport itself, with
228+ confirmation from the user.
229+ + d/control, d/rules: buil-depends on dh-apport and use it
230+ - d/t/simpletest: drop the internetsociety.org test as it requires
231+ network egress access that is not available in the Ubuntu autopkgtest
232+ farm.
233+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
234+ - d/t/control: change the dep8 test dependency to be on the real
235+ bind9-dnsutils package, and not the transitional one (LP #1864761)
236+ - d/rules: change deprecated --with-libjson-c configure argument to
237+ --with-json-c
238+ * Dropped:
239+ - d/control: make bind9-dnsutils multi-arch foreign as another step
240+ towards fixing LP #1864761
241+ [The correct fix was to change the dep8 dependency to be on the real
242+ package, and not the transitional one]
243+ - SECURITY UPDATE: BIND does not sufficiently limit the number of fetches
244+ performed when processing referrals
245+ + debian/patches/CVE-2020-8616.patch: further limit the number of
246+ queries that can be triggered from a request in lib/dns/adb.c,
247+ lib/dns/include/dns/adb.h, lib/dns/resolver.c.
248+ + CVE-2020-8616
249+ [Fixed upstream]
250+ - SECURITY UPDATE: A logic error in code which checks TSIG validity can
251+ be used to trigger an assertion failure in tsig.c
252+ + debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG
253+ BADTIME response in lib/dns/tsig.c.
254+ + CVE-2020-8617
255+ [Fixed upstream]
256+
257+ -- Andreas Hasenack <andreas@canonical.com> Tue, 02 Jun 2020 17:37:44 -0300
258+
259 bind9 (1:9.16.3-1) unstable; urgency=medium
260
261 * New upstream version 9.16.3
262
263 -- Ondřej Surý <ondrej@debian.org> Tue, 19 May 2020 14:14:35 +0200
264
265+bind9 (1:9.16.2-3ubuntu1) groovy; urgency=medium
266+
267+ * Merge with Debian unstable. Remaining changes:
268+ - Don't build dnstap as it depends on universe packages:
269+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
270+ protobuf-c-compiler (universe packages)
271+ + d/dnsutils.install: don't install dnstap
272+ + d/libdns1104.symbols: don't include dnstap symbols
273+ + d/rules: don't build dnstap nor install dnstap.proto
274+ - Add back apport:
275+ + d/bind9.apport: add back old bind9 apport hook, but without calling
276+ attach_conffiles() since that is already done by apport itself, with
277+ confirmation from the user.
278+ + d/control, d/rules: buil-depends on dh-apport and use it
279+ - d/t/simpletest: drop the internetsociety.org test as it requires
280+ network egress access that is not available in the Ubuntu autopkgtest
281+ farm.
282+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
283+ - d/t/control: change the dep8 test dependency to be on the real
284+ bind9-dnsutils package, and not the transitional one (LP #1864761)
285+ - d/control: make bind9-dnsutils multi-arch foreign as another step
286+ towards fixing LP #1864761
287+ - d/rules: change deprecated --with-libjson-c configure argument to
288+ --with-json-c
289+ - SECURITY UPDATE: BIND does not sufficiently limit the number of fetches
290+ performed when processing referrals
291+ + debian/patches/CVE-2020-8616.patch: further limit the number of
292+ queries that can be triggered from a request in lib/dns/adb.c,
293+ lib/dns/include/dns/adb.h, lib/dns/resolver.c.
294+ + CVE-2020-8616
295+ - SECURITY UPDATE: A logic error in code which checks TSIG validity can
296+ be used to trigger an assertion failure in tsig.c
297+ + debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG
298+ BADTIME response in lib/dns/tsig.c.
299+ + CVE-2020-8617
300+ * Dropped:
301+ - use iproute2 instead of net-tools (LP #1850699):
302+ + d/control: replace net-tools depends with iproute2
303+ + d/bind9.init: use ip instead of ifconfig
304+ [In 1:9.16.1-2]
305+ - d/control: Enable readline-like support in dnsutils (nslookup and nsupdate)
306+ via libedit-dev (libreadline has a license conflict with bind)
307+ [In 1:9.16.1-2]
308+ - d/control: drop hardcoded python3 dependency
309+ (LP #1856211, Closes #946643)
310+ [In 1:9.16.1-2]
311+ - d/extras/apparmor.d/usr.sbin.named:
312+ + Add flags=(attach_disconnected) to AppArmor profile
313+ + AppArmor: Allow /var/tmp/krb5_* (owner-only) for Samba AD DLZ
314+ (Closes: #928398)
315+ [In 1:9.16.1-2]
316+ - d/rules: fix typo in the apparmor profile installation
317+ [In 1:9.16.1-2]
318+ - d/control: create transitional packages for dnsutils, bind9utils
319+ [In 1:9.16.1-2]
320+ - d/p/fix-rebinding-protection.patch: fix rebinding protection bug
321+ when using forwarder setups (LP #1873046)
322+ [Fixed upstream]
323+
324+ -- Andreas Hasenack <andreas@canonical.com> Fri, 22 May 2020 09:52:13 -0300
325+
326 bind9 (1:9.16.2-3) unstable; urgency=medium
327
328 [ Simon Deziel ]
329@@ -93,6 +309,106 @@ bind9 (1:9.16.1-1) experimental; urgency=medium
330
331 -- Ondřej Surý <ondrej@debian.org> Fri, 20 Mar 2020 13:59:34 +0100
332
333+bind9 (1:9.16.1-0ubuntu3) groovy; urgency=medium
334+
335+ * SECURITY UPDATE: BIND does not sufficiently limit the number of fetches
336+ performed when processing referrals
337+ - debian/patches/CVE-2020-8616.patch: further limit the number of
338+ queries that can be triggered from a request in lib/dns/adb.c,
339+ lib/dns/include/dns/adb.h, lib/dns/resolver.c.
340+ - CVE-2020-8616
341+ * SECURITY UPDATE: A logic error in code which checks TSIG validity can
342+ be used to trigger an assertion failure in tsig.c
343+ - debian/patches/CVE-2020-8617.patch: don't allow replaying a TSIG
344+ BADTIME response in lib/dns/tsig.c.
345+ - CVE-2020-8617
346+
347+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 19 May 2020 09:03:32 -0400
348+
349+bind9 (1:9.16.1-0ubuntu2) focal; urgency=medium
350+
351+ * d/p/fix-rebinding-protection.patch: fix rebinding protection bug
352+ when using forwarder setups (LP: #1873046)
353+
354+ -- Andreas Hasenack <andreas@canonical.com> Wed, 15 Apr 2020 14:59:51 -0300
355+
356+bind9 (1:9.16.1-0ubuntu1) focal; urgency=medium
357+
358+ * New upstream release: 19.16.1 (LP: #1868272)
359+ - drop d/p/bind-v9.16.0-tcp_quota_fix.patch, fixed upstream
360+ - drop d/p/Fix-dns_client_addtrustedkey.patch, fixed upstream
361+ * d/rules: change deprecated --with-libjson-c configure argument to
362+ --with-json-c
363+
364+ -- Andreas Hasenack <andreas@canonical.com> Tue, 24 Mar 2020 11:44:46 -0300
365+
366+bind9 (1:9.16.0-1ubuntu5) focal; urgency=medium
367+
368+ * d/control, d/rules: enable GeoIP2 support, since libmaxminddb is now
369+ in main (LP: #1866875)
370+
371+ -- Andreas Hasenack <andreas@canonical.com> Mon, 16 Mar 2020 16:17:47 -0300
372+
373+bind9 (1:9.16.0-1ubuntu4) focal; urgency=medium
374+
375+ * d/p/bind-v9.16.0-tcp_quota_fix.patch: fix error in handling TCP
376+ client quota limits (LP: #1866378)
377+ * d/p/Fix-dns_client_addtrustedkey.patch: fix buffer size in
378+ dns_client_addtrustedkey (LP: #1866384)
379+
380+ -- Andreas Hasenack <andreas@canonical.com> Fri, 06 Mar 2020 15:12:56 -0300
381+
382+bind9 (1:9.16.0-1ubuntu3) focal; urgency=medium
383+
384+ * d/control: make bind9-dnsutils multi-arch foreign as another step
385+ towards fixing LP: #1864761
386+
387+ -- Andreas Hasenack <andreas@canonical.com> Wed, 26 Feb 2020 20:19:40 -0300
388+
389+bind9 (1:9.16.0-1ubuntu2) focal; urgency=medium
390+
391+ * d/t/control: change the dep8 test dependency to be on the real
392+ bind9-dnsutils package, and not the transitional one (LP: #1864761)
393+
394+ -- Andreas Hasenack <andreas@canonical.com> Wed, 26 Feb 2020 14:16:04 -0300
395+
396+bind9 (1:9.16.0-1ubuntu1) focal; urgency=medium
397+
398+ * Merge with Debian unstable. Remaining changes:
399+ - Don't build dnstap as it depends on universe packages:
400+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
401+ protobuf-c-compiler (universe packages)
402+ + d/dnsutils.install: don't install dnstap
403+ + d/libdns1104.symbols: don't include dnstap symbols
404+ + d/rules: don't build dnstap nor install dnstap.proto
405+ - Add back apport:
406+ + d/bind9.apport: add back old bind9 apport hook, but without calling
407+ attach_conffiles() since that is already done by apport itself, with
408+ confirmation from the user.
409+ + d/control, d/rules: buil-depends on dh-apport and use it
410+ - d/control, d/rules: go back to old geoip support, since
411+ libmaxminddb (for GeoIP2) is in universe
412+ * Added back from sid packaging:
413+ - d/t/control, d/t/simpletest: bring back the dep8 test from
414+ debian/sid, with our delta to not query external hosts
415+ - use iproute2 instead of net-tools (LP #1850699):
416+ + d/control: replace net-tools depends with iproute2
417+ + d/bind9.init: use ip instead of ifconfig
418+ - d/control: drop hardcoded python3 dependency
419+ (LP #1856211, Closes #946643)
420+ - d/extras/apparmor.d/usr.sbin.named:
421+ + Add flags=(attach_disconnected) to AppArmor profile
422+ + AppArmor: Allow /var/tmp/krb5_* (owner-only) for Samba AD DLZ
423+ (Closes: #928398)
424+ - d/rules: fix typo in the apparmor profile installation
425+ * Added:
426+ - d/control: create transitional packages for dnsutils, bind9utils
427+ - d/NEWS: mention some of the bigger changes in 9.16.0 packaging
428+ - d/control: Enable readline-like support in dnsutils (nslookup and nsupdate)
429+ via libedit-dev (libreadline has a license conflict with bind)
430+
431+ -- Andreas Hasenack <andreas@canonical.com> Mon, 24 Feb 2020 11:51:37 -0300
432+
433 bind9 (1:9.16.0-1) experimental; urgency=medium
434
435 * Change the branch to 9.16
436@@ -384,6 +700,462 @@ bind (1:9.12.0+dfsg-1~exp0) experimental; urgency=medium
437
438 -- Ondřej Surý <ondrej@debian.org> Wed, 24 Jan 2018 09:18:13 +0000
439
440+bind9 (1:9.11.14+dfsg-3ubuntu1) focal; urgency=medium
441+
442+ * Merge with Debian unstable. Remaining changes:
443+ - Don't build dnstap as it depends on universe packages:
444+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
445+ protobuf-c-compiler (universe packages)
446+ + d/dnsutils.install: don't install dnstap
447+ + d/libdns1104.symbols: don't include dnstap symbols
448+ + d/rules: don't build dnstap nor install dnstap.proto
449+ - d/t/simpletest: drop the internetsociety.org test as it requires
450+ network egress access that is not available in the Ubuntu autopkgtest
451+ farm.
452+ - Add back apport:
453+ + d/bind9.apport: add back old bind9 apport hook, but without calling
454+ attach_conffiles() since that is already done by apport itself, with
455+ confirmation from the user.
456+ + d/control, d/rules: buil-depends on dh-apport and use it
457+ - d/control, d/rules: go back to old geoip support, since
458+ libmaxminddb (for GeoIP2) is in universe
459+ * Dropped:
460+ - use iproute2 instead of net-tools (LP #1850699):
461+ + d/control: replace net-tools depends with iproute2
462+ + d/bind9.init: use ip instead of ifconfig
463+ [In 1:9.11.14+dfsg-2]
464+ - d/control: drop hardcoded python3 dependency in bind9utils,
465+ dh-python injects the correct one via ${python3:Depends}
466+ (LP #1856211, Closes #946643)
467+ [In 1:9.11.14+dfsg-1]
468+
469+ -- Andreas Hasenack <andreas@canonical.com> Mon, 27 Jan 2020 11:47:26 -0300
470+
471+bind9 (1:9.11.14+dfsg-1ubuntu1) focal; urgency=medium
472+
473+ * Merge with Debian unstable. Remaining changes:
474+ - Don't build dnstap as it depends on universe packages:
475+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
476+ protobuf-c-compiler (universe packages)
477+ + d/dnsutils.install: don't install dnstap
478+ + d/libdns1104.symbols: don't include dnstap symbols
479+ + d/rules: don't build dnstap nor install dnstap.proto
480+ - d/t/simpletest: drop the internetsociety.org test as it requires
481+ network egress access that is not available in the Ubuntu autopkgtest
482+ farm.
483+ - use iproute2 instead of net-tools (LP #1850699):
484+ + d/control: replace net-tools depends with iproute2
485+ + d/bind9.init: use ip instead of ifconfig
486+ [Updated to also check the exit status of the command]
487+ - d/control: drop hardcoded python3 dependency in bind9utils,
488+ dh-python injects the correct one via ${python3:Depends}
489+ (LP #1856211, Closes: #946643)
490+ * Dropped:
491+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
492+ option (LP #1804648)
493+ [Fixed upstream in 9.11.6rc1]
494+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
495+ close to a query timeout (LP #1797926)
496+ [Fixed upstream in 9.11.6rc1]
497+ - SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single
498+ connection
499+ + debian/patches/CVE-2019-6477.patch: limit number of clients in
500+ bin/named/client.c, bin/named/include/named/client.h.
501+ + CVE-2019-6477
502+ [Fixed upstream in 9.11.13]
503+ * Added:
504+ - Add back apport:
505+ + d/bind9.apport: add back old bind9 apport hook, but without calling
506+ attach_conffiles() since that is already done by apport itself, with
507+ confirmation from the user.
508+ + d/control, d/rules: buil-depends on dh-apport and use it
509+ - d/control, d/rules: go back to old geoip support, since
510+ libmaxminddb (for GeoIP2) is in universe
511+
512+ -- Andreas Hasenack <andreas@canonical.com> Wed, 15 Jan 2020 14:07:05 -0300
513+
514+bind9 (1:9.11.5.P4+dfsg-5.1ubuntu5) focal; urgency=medium
515+
516+ * d/control: drop hardcoded python3 dependency in bind9utils,
517+ dh-python injects the correct one via ${python3:Depends}
518+ (LP: #1856211, Closes: #946643)
519+
520+ -- Andreas Hasenack <andreas@canonical.com> Thu, 12 Dec 2019 14:40:20 -0300
521+
522+bind9 (1:9.11.5.P4+dfsg-5.1ubuntu4) focal; urgency=medium
523+
524+ * SECURITY UPDATE: TCP Pipelining doesn't limit TCP clients on a single
525+ connection
526+ - debian/patches/CVE-2019-6477.patch: limit number of clients in
527+ bin/named/client.c, bin/named/include/named/client.h.
528+ - CVE-2019-6477
529+
530+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 21 Nov 2019 07:50:24 -0500
531+
532+bind9 (1:9.11.5.P4+dfsg-5.1ubuntu3) focal; urgency=medium
533+
534+ * use iproute2 instead of net-tools (LP: #1850699):
535+ - d/control: replace net-tools depends with iproute2
536+ - d/bind9.init: use ip instead of ifconfig
537+ * d/bind9.install, d/control, d/rules: re-enable lmdb, which is now
538+ in main.
539+
540+ -- Andreas Hasenack <andreas@canonical.com> Fri, 08 Nov 2019 10:15:01 -0300
541+
542+bind9 (1:9.11.5.P4+dfsg-5.1ubuntu2) eoan; urgency=medium
543+
544+ * Rebuild against new libjson-c4.
545+
546+ -- Gianfranco Costamagna <locutusofborg@debian.org> Sat, 29 Jun 2019 13:45:33 +0200
547+
548+bind9 (1:9.11.5.P4+dfsg-5.1ubuntu1) eoan; urgency=medium
549+
550+ * Merge with Debian unstable. Remaining changes:
551+ - Build without lmdb support as that package is in Universe
552+ - Don't build dnstap as it depends on universe packages:
553+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
554+ protobuf-c-compiler (universe packages)
555+ + d/dnsutils.install: don't install dnstap
556+ + d/libdns1104.symbols: don't include dnstap symbols
557+ + d/rules: don't build dnstap nor install dnstap.proto
558+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
559+ option (LP #1804648)
560+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
561+ close to a query timeout (LP #1797926)
562+ - d/t/simpletest: drop the internetsociety.org test as it requires
563+ network egress access that is not available in the Ubuntu autopkgtest
564+ farm.
565+ * Dropped:
566+ - SECURITY UPDATE: DoS via malformed packets
567+ + d/p/CVE-2019-6471.patch: fix race condition in lib/dns/dispatch.c
568+ + CVE-2019-6471
569+ [Fixed in 1:9.11.5.P4+dfsg-5.1]
570+
571+ -- Rafael David Tinoco <rafaeldtinoco@ubuntu.com> Thu, 27 Jun 2019 14:54:25 +0000
572+
573+bind9 (1:9.11.5.P4+dfsg-5ubuntu1) eoan; urgency=medium
574+
575+ * Merge with Debian unstable. Remaining changes:
576+ - Build without lmdb support as that package is in Universe
577+ - Don't build dnstap as it depends on universe packages:
578+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
579+ protobuf-c-compiler (universe packages)
580+ + d/dnsutils.install: don't install dnstap
581+ + d/libdns1104.symbols: don't include dnstap symbols
582+ + d/rules: don't build dnstap nor install dnstap.proto
583+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
584+ option (LP #1804648)
585+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
586+ close to a query timeout (LP #1797926)
587+ - d/t/simpletest: drop the internetsociety.org test as it requires
588+ network egress access that is not available in the Ubuntu autopkgtest
589+ farm.
590+ - SECURITY UPDATE: DoS via malformed packets
591+ + d/p/CVE-2019-6471.patch: fix race condition in lib/dns/dispatch.c
592+ + CVE-2019-6471
593+
594+ -- Rafael David Tinoco <rafaeldtinoco@ubuntu.com> Fri, 21 Jun 2019 18:06:22 +0000
595+
596+bind9 (1:9.11.5.P4+dfsg-4ubuntu2) eoan; urgency=medium
597+
598+ * SECURITY UPDATE: DoS via malformed packets
599+ - debian/patches/CVE-2019-6471.patch: fix race condition in
600+ lib/dns/dispatch.c.
601+ - CVE-2019-6471
602+
603+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 20 Jun 2019 08:15:00 -0400
604+
605+bind9 (1:9.11.5.P4+dfsg-4ubuntu1) eoan; urgency=medium
606+
607+ * Merge with Debian unstable. Remaining changes:
608+ - Build without lmdb support as that package is in Universe
609+ - Don't build dnstap as it depends on universe packages:
610+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
611+ protobuf-c-compiler (universe packages)
612+ + d/dnsutils.install: don't install dnstap
613+ + d/libdns1104.symbols: don't include dnstap symbols
614+ + d/rules: don't build dnstap nor install dnstap.proto
615+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
616+ option (LP #1804648)
617+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
618+ close to a query timeout (LP #1797926)
619+ - d/t/simpletest: drop the internetsociety.org test as it requires
620+ network egress access that is not available in the Ubuntu autopkgtest
621+ farm.
622+ * Dropped:
623+ - SECURITY UPDATE: memory leak via specially crafted packet
624+ + debian/patches/CVE-2018-5744.patch: silently drop additional keytag
625+ options in bin/named/client.c.
626+ + CVE-2018-5744
627+ [Fixed upstream in 9.11.5-P2]
628+ - SECURITY UPDATE: assertion failure when a trust anchor rolls over to an
629+ unsupported key algorithm when using managed-keys
630+ + debian/patches/CVE-2018-5745.patch: properly handle situations when
631+ the key tag cannot be computed in lib/dns/include/dst/dst.h,
632+ lib/dns/zone.c.
633+ + CVE-2018-5745
634+ [Fixed upstream in 9.11.5-P2]
635+ - SECURITY UPDATE: Controls for zone transfers may not be properly
636+ applied to Dynamically Loadable Zones (DLZs) if the zones are writable
637+ + debian/patches/CVE-2019-6465.patch: handle zone transfers marked in
638+ the zone table as a DLZ zone bin/named/xfrout.c.
639+ + CVE-2019-6465
640+ [Fixed upstream in 9.11.5-P3]
641+ - SECURITY UPDATE: limiting simultaneous TCP clients is ineffective
642+ + debian/patches/CVE-2018-5743.patch: add reference counting in
643+ bin/named/client.c, bin/named/include/named/client.h,
644+ bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c,
645+ lib/isc/include/isc/quota.h, lib/isc/quota.c,
646+ lib/isc/win32/libisc.def.in.
647+ + debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic
648+ operations with isc_refcount reference counting in
649+ bin/named/client.c, bin/named/include/named/interfacemgr.h,
650+ bin/named/interfacemgr.c.
651+ + debian/libisc1100.symbols: added new symbols.
652+ + CVE-2018-5743
653+ [Fixed in 1:9.11.5.P4+dfsg-4]
654+ - d/rules: add back EdDSA support (LP #1825712)
655+ [Fixed in 1:9.11.5.P4+dfsg-4]
656+
657+ -- Andreas Hasenack <andreas@canonical.com> Thu, 02 May 2019 13:35:59 -0300
658+
659+bind9 (1:9.11.5.P1+dfsg-1ubuntu4) eoan; urgency=medium
660+
661+ * d/rules: add back EdDSA support (LP: #1825712)
662+
663+ -- Andreas Hasenack <andreas@canonical.com> Fri, 26 Apr 2019 14:04:37 +0000
664+
665+bind9 (1:9.11.5.P1+dfsg-1ubuntu3) eoan; urgency=medium
666+
667+ * SECURITY UPDATE: limiting simultaneous TCP clients is ineffective
668+ - debian/patches/CVE-2018-5743.patch: add reference counting in
669+ bin/named/client.c, bin/named/include/named/client.h,
670+ bin/named/include/named/interfacemgr.h, bin/named/interfacemgr.c,
671+ lib/isc/include/isc/quota.h, lib/isc/quota.c,
672+ lib/isc/win32/libisc.def.in.
673+ - debian/patches/CVE-2018-5743-atomic-fix.patch: replace atomic
674+ operations with isc_refcount reference counting in
675+ bin/named/client.c, bin/named/include/named/interfacemgr.h,
676+ bin/named/interfacemgr.c.
677+ - debian/libisc1100.symbols: added new symbols.
678+ - CVE-2018-5743
679+
680+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 24 Apr 2019 05:00:07 -0400
681+
682+bind9 (1:9.11.5.P1+dfsg-1ubuntu2) disco; urgency=medium
683+
684+ * SECURITY UPDATE: memory leak via specially crafted packet
685+ - debian/patches/CVE-2018-5744.patch: silently drop additional keytag
686+ options in bin/named/client.c.
687+ - CVE-2018-5744
688+ * SECURITY UPDATE: assertion failure when a trust anchor rolls over to an
689+ unsupported key algorithm when using managed-keys
690+ - debian/patches/CVE-2018-5745.patch: properly handle situations when
691+ the key tag cannot be computed in lib/dns/include/dst/dst.h,
692+ lib/dns/zone.c.
693+ - CVE-2018-5745
694+ * SECURITY UPDATE: Controls for zone transfers may not be properly
695+ applied to Dynamically Loadable Zones (DLZs) if the zones are writable
696+ - debian/patches/CVE-2019-6465.patch: handle zone transfers marked in
697+ the zone table as a DLZ zone bin/named/xfrout.c.
698+ - CVE-2019-6465
699+
700+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 22 Feb 2019 10:52:30 +0100
701+
702+bind9 (1:9.11.5.P1+dfsg-1ubuntu1) disco; urgency=medium
703+
704+ * Merge with Debian unstable. Remaining changes:
705+ - Build without lmdb support as that package is in Universe
706+ - Don't build dnstap as it depends on universe packages:
707+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
708+ protobuf-c-compiler (universe packages)
709+ + d/dnsutils.install: don't install dnstap
710+ + d/libdns1104.symbols: don't include dnstap symbols
711+ + d/rules: don't build dnstap nor install dnstap.proto
712+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
713+ option (LP #1804648)
714+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
715+ close to a query timeout (LP #1797926)
716+ - d/t/simpletest: drop the internetsociety.org test as it requires
717+ network egress access that is not available in the Ubuntu autopkgtest
718+ farm.
719+
720+ -- Andreas Hasenack <andreas@canonical.com> Thu, 17 Jan 2019 18:59:25 -0200
721+
722+bind9 (1:9.11.5+dfsg-1ubuntu1) disco; urgency=medium
723+
724+ * Merge with Debian unstable. Remaining changes:
725+ - Build without lmdb support as that package is in Universe
726+ - Don't build dnstap as it depends on universe packages:
727+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
728+ protobuf-c-compiler (universe packages)
729+ + d/dnsutils.install: don't install dnstap
730+ + d/libdns1104.symbols: don't include dnstap symbols
731+ + d/rules: don't build dnstap nor install dnstap.proto
732+ * Dropped:
733+ - SECURITY UPDATE: denial of service crash when deny-answer-aliases
734+ option is used
735+ + debian/patches/CVE-2018-5740-1.patch: explicit DNAME query could
736+ trigger a crash if deny-answer-aliases was set
737+ + debian/patches/CVE-2018-5740-2.patch: add tests
738+ + debian/patches/CVE-2018-5740-3.patch: caclulate nlabels and set
739+ chainingp correctly, add test
740+ + CVE-2018-5740
741+ [Fixed in new upstream version 9.11.5]
742+ - d/extras/apparmor.d/usr.sbin.named: add missing comma at the end of the
743+ line (Closes: #904983)
744+ [Fixed in 1:9.11.4+dfsg-4]
745+ - Add a patch to fix named-pkcs11 crashing on startup. (LP #1769440)
746+ [Fixed in 1:9.11.4.P1+dfsg-1]
747+ - Cherrypick from debian: Add new dst__openssleddsa_init optional symbol
748+ (it depends on OpenSSL version) (Closes: #897643)
749+ [Fixed in 1:9.11.4.P1+dfsg-1]
750+ * Added:
751+ - d/p/enable-udp-in-host-command.diff: fix parsing of the -U command line
752+ option (LP: #1804648)
753+ - d/p/fix-shutdown-race.diff: dig/host/nslookup could crash when interrupted
754+ close to a query timeout (LP: #1797926)
755+ - d/t/simpletest: drop the internetsociety.org test as it requires
756+ network egress access that is not available in the Ubuntu autopkgtest
757+ farm.
758+
759+ -- Andreas Hasenack <andreas@canonical.com> Thu, 13 Dec 2018 19:40:23 -0200
760+
761+bind9 (1:9.11.4+dfsg-3ubuntu5) cosmic; urgency=high
762+
763+ * No change rebuild against openssl 1.1.1 with TLS 1.3 support.
764+
765+ -- Dimitri John Ledkov <xnox@ubuntu.com> Sat, 29 Sep 2018 01:36:45 +0100
766+
767+bind9 (1:9.11.4+dfsg-3ubuntu4) cosmic; urgency=medium
768+
769+ * SECURITY UPDATE: denial of service crash when deny-answer-aliases
770+ option is used
771+ - debian/patches/CVE-2018-5740-1.patch: explicit DNAME query could
772+ trigger a crash if deny-answer-aliases was set
773+ - debian/patches/CVE-2018-5740-2.patch: add tests
774+ - debian/patches/CVE-2018-5740-3.patch: caclulate nlabels and set
775+ chainingp correctly, add test
776+ - CVE-2018-5740
777+
778+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 20 Sep 2018 11:11:05 +0200
779+
780+bind9 (1:9.11.4+dfsg-3ubuntu3) cosmic; urgency=medium
781+
782+ * Cherrypick from debian: Add new dst__openssleddsa_init optional symbol
783+ (it depends on OpenSSL version) (Closes: #897643)
784+
785+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 18 Sep 2018 10:39:12 +0200
786+
787+bind9 (1:9.11.4+dfsg-3ubuntu2) cosmic; urgency=medium
788+
789+ * d/p/skip-rtld-deepbind-for-dyndb.diff: Add a patch to fix named-pkcs11
790+ crashing on startup. (LP: #1769440)
791+
792+ -- Karl Stenerud <karl.stenerud@canonical.com> Thu, 30 Aug 2018 07:11:39 -0700
793+
794+bind9 (1:9.11.4+dfsg-3ubuntu1) cosmic; urgency=medium
795+
796+ * Merge with Debian unstable. Remaining changes:
797+ - Build without lmdb support as that package is in Universe
798+ * Added:
799+ - Don't build dnstap as it depends on universe packages:
800+ + d/control: drop build-depends on libfstrm-dev, libprotobuf-c-dev and
801+ protobuf-c-compiler (universe packages)
802+ + d/dnsutils.install: don't install dnstap
803+ + d/libdns1102.symbols: don't include dnstap symbols
804+ + d/rules: don't build dnstap
805+ - d/extras/apparmor.d/usr.sbin.named: add missing comma at the end of the
806+ line (Closes: #904983)
807+
808+ -- Andreas Hasenack <andreas@canonical.com> Mon, 30 Jul 2018 10:56:04 -0300
809+
810+bind9 (1:9.11.3+dfsg-2ubuntu1) cosmic; urgency=medium
811+
812+ * Merge with Debian unstable (LP: #1777935). Remaining changes:
813+ - Build without lmdb support as that package is in Universe
814+ * Drop:
815+ - SECURITY UPDATE: improperly permits recursive query service
816+ + debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling
817+ in bin/named/server.c.
818+ + CVE-2018-5738
819+ [Applied in Debian's 1:9.11.3+dfsg-2]
820+
821+ -- Andreas Hasenack <andreas@canonical.com> Wed, 20 Jun 2018 17:42:16 -0300
822+
823+bind9 (1:9.11.3+dfsg-1ubuntu2) cosmic; urgency=medium
824+
825+ * SECURITY UPDATE: improperly permits recursive query service
826+ - debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling
827+ in bin/named/server.c.
828+ - CVE-2018-5738
829+
830+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 11 Jun 2018 09:41:51 -0400
831+
832+bind9 (1:9.11.3+dfsg-1ubuntu1) bionic; urgency=low
833+
834+ * New upstream release. (LP: #1763572)
835+ - fix a crash when configured with ipa-dns-install
836+ * Merge from Debian unstable. Remaining changes:
837+ - Build without lmdb support as that package is in Universe
838+
839+ -- Timo Aaltonen <tjaalton@debian.org> Fri, 13 Apr 2018 07:40:47 +0300
840+
841+bind9 (1:9.11.2.P1-1ubuntu5) bionic; urgency=medium
842+
843+ * debian/patches/nsupdate-gssapi-fails-ad-45854.patch: fix updating
844+ DNS records in Microsoft AD using GSSAPI. Thanks to Mark Andrews
845+ <marka@isc.org>. (LP: #1755439)
846+
847+ -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Mar 2018 09:38:46 -0300
848+
849+bind9 (1:9.11.2.P1-1ubuntu4) bionic; urgency=medium
850+
851+ * Fix apparmor profile filename (LP: #1754981)
852+
853+ -- Andreas Hasenack <andreas@canonical.com> Thu, 15 Mar 2018 10:06:57 -0300
854+
855+bind9 (1:9.11.2.P1-1ubuntu3) bionic; urgency=high
856+
857+ * No change rebuild against openssl1.1.
858+
859+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 06 Feb 2018 12:14:22 +0000
860+
861+bind9 (1:9.11.2.P1-1ubuntu2) bionic; urgency=medium
862+
863+ * Build without lmdb support as that package is in Universe (LP: #1746296)
864+ - d/control: remove Build-Depends on liblmdb-dev
865+ - d/rules: configure --without-lmdb
866+ - d/bind9.install: drop named-nzd2nzf and named-nzd2nzf.8 as it requires
867+ lmdb.
868+
869+ -- Andreas Hasenack <andreas@canonical.com> Tue, 30 Jan 2018 15:21:23 -0200
870+
871+bind9 (1:9.11.2.P1-1ubuntu1) bionic; urgency=medium
872+
873+ * Merge with Debian unstable (LP: #1744930).
874+ * Drop:
875+ - Add RemainAfterExit to bind9-resolvconf unit configuration file
876+ (LP #1536181).
877+ [fixed in 1:9.10.6+dfsg-4]
878+ - rules: Fix path to libsofthsm2.so. (LP #1685780)
879+ [adopted in 1:9.10.6+dfsg-5]
880+ - d/p/CVE-2016-8864-regression-test.patch: tests for the regression
881+ introduced with the CVE-2016-8864.patch and fixed in
882+ CVE-2016-8864-regression.patch.
883+ [applied upstream]
884+ - d/p/CVE-2016-8864-regression2-test.patch: tests for the second
885+ regression (RT #44318) introduced with the CVE-2016-8864.patch
886+ and fixed in CVE-2016-8864-regression2.patch.
887+ [applied upstream]
888+ - d/control, d/rules: add json support for the statistics channels.
889+ (LP #1669193)
890+ [adopted in 1:9.10.6+dfsg-5]
891+ * d/p/add-ply-dependency-to-python-scripts.patch: setup.py is missing
892+ listing the python ply module as a dependency (Closes: #888463)
893+
894+ -- Andreas Hasenack <andreas@canonical.com> Fri, 26 Jan 2018 11:20:33 -0200
895+
896 bind9 (1:9.11.2.P1-1) unstable; urgency=medium
897
898 * New upstream version 9.11.2-P1
899@@ -559,6 +1331,140 @@ bind9 (1:9.10.6+dfsg-1) unstable; urgency=medium
900
901 -- Ondřej Surý <ondrej@debian.org> Fri, 06 Oct 2017 06:18:21 +0000
902
903+bind9 (1:9.10.3.dfsg.P4-12.6ubuntu1) artful; urgency=medium
904+
905+ * Merge with Debian unstable (LP: #1712920). Remaining changes:
906+ - Add RemainAfterExit to bind9-resolvconf unit configuration file
907+ (LP #1536181).
908+ - rules: Fix path to libsofthsm2.so. (LP #1685780)
909+ - d/p/CVE-2016-8864-regression-test.patch: tests for the regression
910+ introduced with the CVE-2016-8864.patch and fixed in
911+ CVE-2016-8864-regression.patch.
912+ - d/p/CVE-2016-8864-regression2-test.patch: tests for the second
913+ regression (RT #44318) introduced with the CVE-2016-8864.patch
914+ and fixed in CVE-2016-8864-regression2.patch.
915+ - d/control, d/rules: add json support for the statistics channels.
916+ (LP #1669193)
917+
918+ -- Andreas Hasenack <andreas@canonical.com> Thu, 24 Aug 2017 18:28:00 -0300
919+
920+bind9 (1:9.10.3.dfsg.P4-12.6) unstable; urgency=medium
921+
922+ * Non-maintainer upload.
923+ * Import upcoming DNSSEC KSK-2017 from 9.10.5 (Closes: #860794)
924+
925+ -- Bernhard Schmidt <berni@debian.org> Fri, 11 Aug 2017 19:10:07 +0200
926+
927+bind9 (1:9.10.3.dfsg.P4-12.5ubuntu1) artful; urgency=medium
928+
929+ * Merge with Debian unstable (LP: #1701687). Remaining changes:
930+ - Add RemainAfterExit to bind9-resolvconf unit configuration file
931+ (LP #1536181).
932+ - rules: Fix path to libsofthsm2.so. (LP #1685780)
933+ * Drop:
934+ - SECURITY UPDATE: denial of service via assertion failure
935+ + debian/patches/CVE-2016-2776.patch: properly handle lengths in
936+ lib/dns/message.c.
937+ + CVE-2016-2776
938+ + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
939+ - SECURITY UPDATE: assertion failure via class mismatch
940+ + debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
941+ records in lib/dns/resolver.c.
942+ + CVE-2016-9131
943+ + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
944+ - SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
945+ + debian/patches/CVE-2016-9147.patch: fix logic when records are
946+ returned without the requested data in lib/dns/resolver.c.
947+ + CVE-2016-9147
948+ + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
949+ - SECURITY UPDATE: assertion failure via unusually-formed DS record
950+ + debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
951+ lib/dns/message.c, lib/dns/resolver.c.
952+ + CVE-2016-9444
953+ + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
954+ - SECURITY UPDATE: regression in CVE-2016-8864
955+ + debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
956+ responses in lib/dns/resolver.c, added tests to
957+ bin/tests/system/dname/ns2/example.db,
958+ bin/tests/system/dname/tests.sh.
959+ + No CVE number
960+ + [Fixed in Debian 1:9.10.3.dfsg.P4-11 and 1:9.10.3.dfsg.P4-12]
961+ - SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
962+ a NULL pointer
963+ + debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
964+ combination in bin/named/query.c, lib/dns/message.c,
965+ lib/dns/rdataset.c.
966+ + CVE-2017-3135
967+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
968+ - SECURITY UPDATE: regression in CVE-2016-8864
969+ + debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
970+ was still being cached when it should have been in lib/dns/resolver.c,
971+ added tests to bin/tests/system/dname/ans3/ans.pl,
972+ bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
973+ + No CVE number
974+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
975+ - SECURITY UPDATE: Denial of Service due to an error handling
976+ synthesized records when using DNS64 with "break-dnssec yes;"
977+ + debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
978+ called.
979+ + CVE-2017-3136
980+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
981+ - SECURITY UPDATE: Denial of Service due to resolver terminating when
982+ processing a response packet containing a CNAME or DNAME
983+ + debian/patches/CVE-2017-3137.patch: don't expect a specific
984+ ordering of answer components; add testcases.
985+ + CVE-2017-3137
986+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3 with 3 patch files]
987+ - SECURITY UPDATE: Denial of Service when receiving a null command on
988+ the control channel
989+ + debian/patches/CVE-2017-3138.patch: don't throw an assert if no
990+ command token is given; add testcase.
991+ + CVE-2017-3138
992+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
993+ - SECURITY UPDATE: TSIG authentication issues
994+ + debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
995+ lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
996+ + CVE-2017-3142
997+ + CVE-2017-3143
998+ + [Fixed in Debian 1:9.10.3.dfsg.P4-12.4]
999+ * d/p/CVE-2016-8864-regression-test.patch: tests for the regression
1000+ introduced with the CVE-2016-8864.patch and fixed in
1001+ CVE-2016-8864-regression.patch.
1002+ * d/p/CVE-2016-8864-regression2-test.patch: tests for the second
1003+ regression (RT #44318) introduced with the CVE-2016-8864.patch
1004+ and fixed in CVE-2016-8864-regression2.patch.
1005+ * d/control, d/rules: add json support for the statistics channels.
1006+ (LP: #1669193)
1007+
1008+ -- Andreas Hasenack <andreas@canonical.com> Fri, 11 Aug 2017 17:12:09 -0300
1009+
1010+bind9 (1:9.10.3.dfsg.P4-12.5) unstable; urgency=medium
1011+
1012+ * Non-maintainer upload.
1013+ * Change to fix CVE-2017-3142 and CVE-2017-3143 broke verification of TSIG
1014+ signed TCP message sequences where not all the messages contain TSIG
1015+ records. These may be used in AXFR and IXFR responses.
1016+ (Closes: #868952)
1017+
1018+ -- Salvatore Bonaccorso <carnil@debian.org> Fri, 21 Jul 2017 22:28:32 +0200
1019+
1020+bind9 (1:9.10.3.dfsg.P4-12.4) unstable; urgency=high
1021+
1022+ * Non-maintainer upload.
1023+
1024+ [ Yves-Alexis Perez ]
1025+ * debian/patches:
1026+ - debian/patches/CVE-2017-3142+CVE-2017-3143 added, fix TSIG bypasses
1027+ CVE-2017-3142: error in TSIG authentication can permit unauthorized zone
1028+ transfers. An attacker may be able to circumvent TSIG authentication of
1029+ AXFR and Notify requests.
1030+ CVE-2017-3143: error in TSIG authentication can permit unauthorized
1031+ dynamic updates. An attacker may be able to forge a valid TSIG or SIG(0)
1032+ signature for a dynamic update.
1033+ (Closes: #866564)
1034+
1035+ -- Salvatore Bonaccorso <carnil@debian.org> Sun, 16 Jul 2017 22:13:21 +0200
1036+
1037 bind9 (1:9.10.3.dfsg.P4-12.3+deb9u3) stretch; urgency=medium
1038
1039 [ Bernhard Schmidt ]
1040@@ -665,6 +1571,98 @@ bind9 (1:9.10.3.dfsg.P4-11) unstable; urgency=medium
1041
1042 -- Michael Gilbert <mgilbert@debian.org> Thu, 19 Jan 2017 04:03:28 +0000
1043
1044+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu7) artful; urgency=medium
1045+
1046+ * SECURITY UPDATE: TSIG authentication issues
1047+ - debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
1048+ lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
1049+ - CVE-2017-3142
1050+ - CVE-2017-3143
1051+
1052+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 03 Jul 2017 09:48:13 -0400
1053+
1054+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu6) artful; urgency=medium
1055+
1056+ * rules: Fix path to libsofthsm2.so. (LP: #1685780)
1057+
1058+ -- Timo Aaltonen <tjaalton@debian.org> Mon, 24 Apr 2017 15:01:30 +0300
1059+
1060+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu5) zesty-security; urgency=medium
1061+
1062+ * SECURITY UPDATE: Denial of Service due to an error handling
1063+ synthesized records when using DNS64 with "break-dnssec yes;"
1064+ - debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
1065+ called.
1066+ - CVE-2017-3136
1067+ * SECURITY UPDATE: Denial of Service due to resolver terminating when
1068+ processing a response packet containing a CNAME or DNAME
1069+ - debian/patches/CVE-2017-3137.patch: don't expect a specific
1070+ ordering of answer components; add testcases.
1071+ - CVE-2017-3137
1072+ * SECURITY UPDATE: Denial of Service when receiving a null command on
1073+ the control channel
1074+ - debian/patches/CVE-2017-3138.patch: don't throw an assert if no
1075+ command token is given; add testcase.
1076+ - CVE-2017-3138
1077+
1078+ -- Steve Beattie <sbeattie@ubuntu.com> Wed, 12 Apr 2017 01:32:15 -0700
1079+
1080+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu4) zesty; urgency=medium
1081+
1082+ * SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
1083+ a NULL pointer
1084+ - debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
1085+ combination in bin/named/query.c, lib/dns/message.c,
1086+ lib/dns/rdataset.c.
1087+ - CVE-2017-3135
1088+ * SECURITY UPDATE: regression in CVE-2016-8864
1089+ - debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
1090+ was still being cached when it should have been in lib/dns/resolver.c,
1091+ added tests to bin/tests/system/dname/ans3/ans.pl,
1092+ bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
1093+ - No CVE number
1094+
1095+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 15 Feb 2017 09:37:39 -0500
1096+
1097+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu3) zesty; urgency=medium
1098+
1099+ * SECURITY UPDATE: assertion failure via class mismatch
1100+ - debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
1101+ records in lib/dns/resolver.c.
1102+ - CVE-2016-9131
1103+ * SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
1104+ - debian/patches/CVE-2016-9147.patch: fix logic when records are
1105+ returned without the requested data in lib/dns/resolver.c.
1106+ - CVE-2016-9147
1107+ * SECURITY UPDATE: assertion failure via unusually-formed DS record
1108+ - debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
1109+ lib/dns/message.c, lib/dns/resolver.c.
1110+ - CVE-2016-9444
1111+ * SECURITY UPDATE: regression in CVE-2016-8864
1112+ - debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
1113+ responses in lib/dns/resolver.c, added tests to
1114+ bin/tests/system/dname/ns2/example.db,
1115+ bin/tests/system/dname/tests.sh.
1116+ - No CVE number
1117+
1118+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 25 Jan 2017 09:28:10 -0500
1119+
1120+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu2) zesty; urgency=medium
1121+
1122+ * Add RemainAfterExit to bind9-resolvconf unit configuration file
1123+ (LP: #1536181).
1124+
1125+ -- Nishanth Aravamudan <nish.aravamudan@canonical.com> Tue, 15 Nov 2016 08:24:58 -0800
1126+
1127+bind9 (1:9.10.3.dfsg.P4-10.1ubuntu1) yakkety; urgency=medium
1128+
1129+ * SECURITY UPDATE: denial of service via assertion failure
1130+ - debian/patches/CVE-2016-2776.patch: properly handle lengths in
1131+ lib/dns/message.c.
1132+ - CVE-2016-2776
1133+
1134+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 04 Oct 2016 14:31:17 -0400
1135+
1136 bind9 (1:9.10.3.dfsg.P4-10.1) unstable; urgency=medium
1137
1138 * Non-maintainer upload.
1139diff --git a/debian/control b/debian/control
1140index b6f7ecd..adf5ada 100644
1141--- a/debian/control
1142+++ b/debian/control
1143@@ -1,32 +1,31 @@
1144 Source: bind9
1145 Section: net
1146 Priority: optional
1147-Maintainer: Debian DNS Team <team+dns@tracker.debian.org>
1148+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
1149+XSBC-Original-Maintainer: Debian DNS Team <team+dns@tracker.debian.org>
1150 Uploaders: Ondřej Surý <ondrej@debian.org>,
1151 Bernhard Schmidt <berni@debian.org>
1152 Build-Depends: bison,
1153 debhelper-compat (= 12),
1154 dh-apparmor,
1155+ dh-apport,
1156 dh-exec,
1157 dh-python,
1158 libcap2-dev [linux-any],
1159 libcmocka-dev,
1160 libdb-dev,
1161 libedit-dev,
1162- libfstrm-dev,
1163 libidn2-dev,
1164 libjson-c-dev,
1165 libkrb5-dev,
1166 libldap2-dev,
1167 liblmdb-dev,
1168 libmaxminddb-dev (>= 1.3.0),
1169- libprotobuf-c-dev,
1170 libssl-dev,
1171 libtool,
1172 libuv1-dev,
1173 libxml2-dev,
1174 pkg-config,
1175- protobuf-c-compiler,
1176 python3,
1177 python3-ply,
1178 zlib1g-dev
1179diff --git a/debian/rules b/debian/rules
1180index 0fca88b..54ed8d6 100755
1181--- a/debian/rules
1182+++ b/debian/rules
1183@@ -29,7 +29,7 @@ SED_VERSION_EXTENSIONS := \
1184 sed -e 's,^EXTENSIONS=,EXTENSIONS="$$(dpkg-parsechangelog --file=../debian/changelog | sed -n '/^Version/s/[^-]*//p')-$$(dpkg-vendor --query Vendor)",'
1185
1186 %:
1187- dh $@ --with python3
1188+ dh $@ --with python3,apport
1189
1190 prepare_version_extensions:
1191 if [ ! -f version.bak ]; then \
1192@@ -60,7 +60,7 @@ override_dh_auto_configure:
1193 --with-openssl=/usr \
1194 --with-gssapi=/usr \
1195 --with-libidn2 \
1196- --with-libjson-c \
1197+ --with-json-c \
1198 --with-lmdb=/usr \
1199 --with-gnu-ld \
1200 --with-maxminddb \
1201@@ -69,7 +69,6 @@ override_dh_auto_configure:
1202 --enable-rrl \
1203 --enable-filter-aaaa \
1204 --disable-native-pkcs11 \
1205- --enable-dnstap \
1206 $(EXTRA_FEATURES)
1207
1208 override_dh_auto_build:
1209diff --git a/debian/tests/control b/debian/tests/control
1210index 3e952eb..35b7572 100644
1211--- a/debian/tests/control
1212+++ b/debian/tests/control
1213@@ -1,4 +1,4 @@
1214 Tests: simpletest
1215 Restrictions: needs-root, isolation-container
1216 Depends: bind9,
1217- dnsutils
1218+ bind9-dnsutils
1219diff --git a/debian/tests/simpletest b/debian/tests/simpletest
1220index 468a7c5..34b0b25 100644
1221--- a/debian/tests/simpletest
1222+++ b/debian/tests/simpletest
1223@@ -10,10 +10,6 @@ setup() {
1224 run() {
1225 # Make a query against a local zone
1226 dig -x 127.0.0.1 @127.0.0.1
1227-
1228- # Make a query against an external nameserver and check for DNSSEC validation
1229- echo "Checking for DNSSEC validation status of internetsociety.org"
1230- dig -t a internetsociety.org @127.0.0.1 | egrep 'flags:.+ad; QUERY'
1231 }
1232
1233 teardown() {

Subscribers

People subscribed via source and target branches