<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Times New Roman \(Body CS\)";
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
{font-family:"Segoe UI";
panose-1:2 11 5 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
span.EmailStyle22
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#7030A0;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-AU" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal"><span style="color:#7030A0;mso-fareast-language:EN-US">As the package maintained by the Ubuntu team are “no longer” the source from ISC (but highly modified patches onto an old 9.16.1 source tree), I’d suggest following up with the Ubuntu
maintainers of the package, as it’s likely their back-porting of security patches from much more recent releases is the cause of the issue.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#7030A0;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#7030A0;mso-fareast-language:EN-US">Stuart<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#7030A0;mso-fareast-language:EN-US"><o:p> </o:p></span></p>
<div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:12.0pt;color:black">From:
</span></b><span lang="EN-US" style="font-size:12.0pt;color:black">bind-users <bind-users-bounces@lists.isc.org> on behalf of Ben Bridges <bbridges@springnet.net><br>
<b>Date: </b>Thursday, 8 December 2022 at 11:04 am<br>
<b>To: </b>Emmanuel Fusté <manu.fuste@gmail.com>, "bind-users@lists.isc.org" <bind-users@lists.isc.org><br>
<b>Subject: </b>RE: Bind 9.16.1 crash<o:p></o:p></span></p>
</div>
<div>
<div>
<p class="MsoNormal"><span style="font-size:9.0pt;font-family:"Segoe UI",sans-serif;color:#7030A0"><o:p> </o:p></span></p>
<p class="MsoNormal"><span lang="EN-US">According to the Ubuntu maintainers, the bind9 package on our server (1:9.16.1-0ubuntu2.11) is fully patched for all the BIND 9 CVE’s including the latest batch of 6 released on 2022-09-21 (CVE-2022-38178, CVE-2022-38177,
CVE-2022-3080, CVE-2022-2906, CVE-2022-2881, and CVE-2022-2795).<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p>
<p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p>
<div style="border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span lang="EN-US">From:</span></b><span lang="EN-US"> Emmanuel Fusté <manu.fuste@gmail.com>
<br>
<b>Sent:</b> Wednesday, December 7, 2022 4:22 PM<br>
<b>To:</b> Ben Bridges <bbridges@springnet.net>; bind-users@lists.isc.org<br>
<b>Subject:</b> Re: Bind 9.16.1 crash<o:p></o:p></span></p>
</div>
<p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p>
<div>
<div>
<p class="MsoNormal"><span lang="EN-US">Current ESV : 9.16.35<o:p></o:p></span></p>
<div>
<p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span lang="EN-US">No, your release is not patched.<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span lang="EN-US">Add the ISC PPA repo and install the latest ESV. ISC PPA packaged are packaged by the same maintainers.<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><span lang="EN-US"><o:p> </o:p></span></p>
<div>
<div>
<p class="MsoNormal"><span lang="EN-US">Le mer. 7 déc. 2022, 23:02, Ben Bridges <<a href="mailto:bbridges@springnet.net" target="_blank">bbridges@springnet.net</a>> a écrit :<o:p></o:p></span></p>
</div>
<blockquote style="border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt">
<div>
<div>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span lang="EN-US">Ubuntu 20.04.5 is LTS and BIND 9.16 is the current stable ESV release, so they’re both still fully supported (and fully patched).<o:p></o:p></span></p>
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
</body>
</html>