Skip to content

fix(bind9): CVE-2026-3593/5946/5947/3039#9

Closed
deepin-ci-robot wants to merge 3 commits into
masterfrom
fix/CVE-2026-XXXX-multi
Closed

fix(bind9): CVE-2026-3593/5946/5947/3039#9
deepin-ci-robot wants to merge 3 commits into
masterfrom
fix/CVE-2026-XXXX-multi

Conversation

@deepin-ci-robot
Copy link
Copy Markdown
Contributor

CVE 修复

CVE ID: CVE-2026-3593, CVE-2026-5946, CVE-2026-5947, CVE-2026-3039

漏洞描述: 多个 BIND9 安全漏洞修复

修复方案: Backport 补丁从 BIND 9.20.23

受影响版本: 9.20.0 通过 9.20.22

当前版本: 9.20.21

验证状态: 待验证


  • [CVE-2026-3593]: Fix use-after-free error in DNS-over-HTTPS when processing HTTP/2 SETTINGS frames.
  • [CVE-2026-5946]: Disable recursion, UPDATE, and NOTIFY for non-IN views.
  • [CVE-2026-5947]: Fix crash in resolver when SIG(0)-signed responses are received under load.
  • [CVE-2026-3039]: Fix GSS-API resource leak when receiving maliciously-constructed packets.

Fix-Approach: backport
Generated-By: Qwen3.6-35B-A3B-UD-Q4_K_M.gguf
Co-Authored-By: hudeng hudeng@deepin.org

@deepin-ci-robot
Copy link
Copy Markdown
Contributor Author

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign tsic404 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@deepin-ci-robot
Copy link
Copy Markdown
Contributor Author

/hold
因为该quilt包的上游版本号变更,详情见: deepin-community/infra-settings#134

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 21, 2026

TAG Bot

TAG: 1%9.20.23-1_deb13u1deepin1
EXISTED: no
DISTRIBUTION: unstable

deepin-ci-robot and others added 2 commits May 21, 2026 17:47
Backport security fixes from BIND 9.20.23:

- CVE-2026-3593: Fix use-after-free error in DNS-over-HTTPS when
  processing HTTP/2 SETTINGS frames.
- CVE-2026-5946: Disable recursion, UPDATE, and NOTIFY for non-IN
  views.
- CVE-2026-5947: Fix crash in resolver when SIG(0)-signed responses
  are received under load.
- CVE-2026-3039: Fix GSS-API resource leak when receiving
  maliciously-constructed packets.

Upstream: https://kb.isc.org/docs/cve-2026-3593
Upstream: https://kb.isc.org/docs/cve-2026-5946
Upstream: https://kb.isc.org/docs/cve-2026-5947
Upstream: https://kb.isc.org/docs/cve-2026-3039
Generated-By: Qwen3.6-35B-A3B-UD-Q4_K_M.gguf
Co-Authored-By: hudeng <hudeng@deepin.org>
Update debian/changelog with CVE-2026-3593/5946/5947/3039 entries.

Generated-By: Qwen3.6-35B-A3B-UD-Q4_K_M.gguf
Co-Authored-By: hudeng <hudeng@deepin.org>
@deepin-ci-robot deepin-ci-robot force-pushed the fix/CVE-2026-XXXX-multi branch from f9bb5cc to 85eb5e3 Compare May 21, 2026 09:48
CVE-2026-3593/5946/5947/3039 are already fixed in upstream
version 9.20.23, no backport patches needed.

Generated-By: Qwen3.6-35B-A3B-UD-Q4_K_M.gguf
Co-Authored-By: hudeng <hudeng@deepin.org>
@hudeng-go hudeng-go closed this May 21, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants