bind9 (1:9.10.3.dfsg.P4-10.1ubuntu3) zesty; urgency=medium
* SECURITY UPDATE: assertion failure via class mismatch
- debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
records in lib/dns/resolver.c.
- CVE-2016-9131
* SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
- debian/patches/CVE-2016-9147.patch: fix logic when records are
returned without the requested data in lib/dns/resolver.c.
- CVE-2016-9147
* SECURITY UPDATE: assertion failure via unusually-formed DS record
- debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
lib/dns/message.c, lib/dns/resolver.c.
- CVE-2016-9444
* SECURITY UPDATE: regression in CVE-2016-8864
- debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
responses in lib/dns/resolver.c, added tests to
bin/tests/system/dname/ns2/example.db,
bin/tests/system/dname/tests.sh.
- No CVE number
$ cat debian/patches/series
02_version.diff
05_non-linux.diff
07_multiarch.diff
10_min-cache-ttl.diff
20_random_1.diff
25_library_paths.diff
30_dynamic_db.diff
32_mips_atomic.diff
33_resource_missing_include.diff
34_prepare_native_pkcs11.diff
70_precise_time.diff
75_ctxstart_no_sighandling.diff
CVE-2016-2776.patch
CVE-2016-8864.patch
CVE-2016-9131.patch
CVE-2016-9147.patch
CVE-2016-9444.patch
rt43779.patch