bind9 (1:9.8.1.dfsg.P1-4ubuntu1) quantal; urgency=low

  * SECURITY UPDATE: ghost domain names attack
    - lib/dns/rbtdb.c: Restrict the TTL of NS RRset to no more than that
      of the old NS RRset when replacing it.
    - Patch backported from 9.8.2.
    - CVE-2012-1033
  * SECURITY UPDATE: denial of service via zero length rdata handling
    - lib/dns/rdata.c,lib/dns/rdataslab.c: use sentinel pointer for
      duplicate rdata.
    - Patch backported from 9.8.3-P1.
    - CVE-2012-1667

Date: Wed, 20 Jun 2012 15:26:09 -0400
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
https://launchpad.net/ubuntu/quantal/+source/bind9/1:9.8.1.dfsg.P1-4ubuntu1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 20 Jun 2012 15:26:09 -0400
Source: bind9
Binary: bind9 bind9utils bind9-doc host bind9-host libbind-dev libbind9-80 
libdns81 libisc83 liblwres80 libisccc80 libisccfg82 dnsutils lwresd
Architecture: source
Version: 1:9.8.1.dfsg.P1-4ubuntu1
Distribution: quantal
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauri...@ubuntu.com>
Description: 
 bind9      - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 bind9-host - Version of 'host' bundled with BIND 9.X
 bind9utils - Utilities for BIND
 dnsutils   - Clients provided with BIND
 host       - Transitional package
 libbind-dev - Static Libraries and Headers used by BIND
 libbind9-80 - BIND9 Shared Library used by BIND
 libdns81   - DNS Shared Library used by BIND
 libisc83   - ISC Shared Library used by BIND
 libisccc80 - Command Channel Library used by BIND
 libisccfg82 - Config File Handling Library used by BIND
 liblwres80 - Lightweight Resolver Library used by BIND
 lwresd     - Lightweight Resolver Daemon
Changes: 
 bind9 (1:9.8.1.dfsg.P1-4ubuntu1) quantal; urgency=low
 .
   * SECURITY UPDATE: ghost domain names attack
     - lib/dns/rbtdb.c: Restrict the TTL of NS RRset to no more than that
       of the old NS RRset when replacing it.
     - Patch backported from 9.8.2.
     - CVE-2012-1033
   * SECURITY UPDATE: denial of service via zero length rdata handling
     - lib/dns/rdata.c,lib/dns/rdataslab.c: use sentinel pointer for
       duplicate rdata.
     - Patch backported from 9.8.3-P1.
     - CVE-2012-1667
Checksums-Sha1: 
 6e69ee74bef18a113e3b227be20bb91ec1afe341 2697 bind9_9.8.1.dfsg.P1-4ubuntu1.dsc
 7b03318b6985ea3eb719a7ef69e96ceb58529203 504198 
bind9_9.8.1.dfsg.P1-4ubuntu1.diff.gz
Checksums-Sha256: 
 3ccd03ca8e7ba0d427e245c4e58ca5da868e270e5ba3a5dcf73abf1349701a09 2697 
bind9_9.8.1.dfsg.P1-4ubuntu1.dsc
 221c6b0ee18b4a631d9fbd3c8a06b316a9451dbe9a69eee4b2e83a12cbb6c568 504198 
bind9_9.8.1.dfsg.P1-4ubuntu1.diff.gz
Files: 
 b37d8c802059f551a0770ed51833c98c 2697 net optional 
bind9_9.8.1.dfsg.P1-4ubuntu1.dsc
 84cd459bc3dbff5587c0c66cb3ccd522 504198 net optional 
bind9_9.8.1.dfsg.P1-4ubuntu1.diff.gz
Original-Maintainer: LaMont Jones <lam...@debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=xb0/
-----END PGP SIGNATURE-----
-- 
Quantal-changes mailing list
Quantal-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/quantal-changes

Reply via email to