#11442: bind9 9.12.3-P1
-------------------------+-----------------------
 Reporter:  renodr       |      Owner:  blfs-book
     Type:  enhancement  |     Status:  new
 Priority:  high         |  Milestone:  8.4
Component:  BOOK         |    Version:  SVN
 Severity:  normal       |   Keywords:
-------------------------+-----------------------
 New security release


 {{{
 1 Release Notes for BIND Version 9.12.3-P1
 1.1 Introduction
 This document summarizes changes since the last production release on the
 BIND 9.12 branch. Please
 see the CHANGES for a further list of bug fixes and other changes.
 1.2 Download
 The latest versions of BIND 9 software can always be found at
 http://www.isc.org/downloads/. There
 you will find additional information about each release, source code, and
 pre-compiled versions for
 Microsoft Windows operating systems.
 1.3 Security Fixes
 • named could crash during recursive processing of DNAME records when
 deny-answer-aliases
 was in use. This flaw is disclosed in CVE-2018-5740. [GL #387]
 • When recursion is enabled but the allow-recursion and allow-query-cache
 ACLs are not specified,
 they should be limited to local networks, but they were inadvertently set
 to match the default
 allow-query, thus allowing remote queries. This flaw is disclosed in
 CVE-2018-5738. [GL #309]
 • The serve-stale feature could cause an assertion failure in rbtdb.c even
 when stale-answer-enable
 was false. The simultaneous use of stale cache records and NSEC aggressive
 negative caching
 could trigger a recursion loop in the named process. This flaw is
 disclosed in CVE-2018-5737. [GL
 #185]
 • A bug in zone database reference counting could lead to a crash when
 multiple versions of a slave
 zone were transferred from a master in close succession. This flaw is
 disclosed in CVE-2018-5736.
 [GL #134]
 • Code change #4964, intended to prevent double signatures when deleting
 an inactive zone DNSKEY
 in some situations, introduced a new problem during zone processing in
 which some delegation
 glue RRsets are incorrectly identified as needing RRSIGs, which are then
 created for them using
 the current active ZSK for the zone. In some, but not all cases, the
 newly-signed RRsets are added
 to the zone’s NSEC/NSEC3 chain, but incompletely -- this can result in a
 broken chain, affecting
 validation of proof of nonexistence for records in the zone. [GL #771]
 1.4 New Features
 • update-policy rules that otherwise ignore the name field now require
 that it be set to "." to ensure
 that any type list present is properly interpreted. Previously, if the
 name field was omitted from
 the rule declaration but a type list was present, it wouldn’t be
 interpreted as expected.
 • named now supports the "root key sentinel" mechanism. This enables
 validating resolvers to
 indicate which trust anchors are configured for the root, so that
 information about root key rollover
 status can be gathered. To disable this feature, add root-key-sentinel no;
 to named.conf. [GL
 #37]
 • Add the ability to not return a DNS COOKIE option when one is present in
 the request. To prevent
 a cookie being returned add answer-cookie no; to named.conf. [GL #173]
 answer-cookie no is only intended as a temporary measure, for use when
 named shares an IP
 address with other servers that do not yet support DNS COOKIE. A mismatch
 between servers on
 the same address is not expected to cause operational problems, but the
 option to disable COOKIE
 responses so that all servers have the same behavior is provided out of an
 abundance of caution.
 DNS COOKIE is an important security mechanism, and should not be disabled
 unless absolutely
 necessary.
 • Two new update policy rule types have been added krb5-selfsub and ms-
 selfsub which allow
 machines with Kerberos principals to update the name space at or below the
 machine names identified
 in the respective principals.
 1
 1.5 Feature Changes
 • BIND now can be compiled against libidn2 library to add IDNA2008
 support. Previously BIND
 only supported IDNA2003 using (now obsolete) idnkit-1 library.
 • dig +noidnin can be used to disable IDN processing on the input domain
 name, when BIND is
 compiled with IDN support.
 • The rndc nta command could not differentiate between views of the same
 name but different class;
 this has been corrected with the addition of a -class option. [GL #105]
 1.6 Bug Fixes
 • When a negative trust anchor was added to multiple views using rndc nta,
 the text returned via
 rndc was incorrectly truncated after the first line, making it appear that
 only one NTA had been
 added. This has been fixed. [GL #105]
 • named now rejects excessively large incremental (IXFR) zone transfers in
 order to prevent possible
 corruption of journal files which could cause named to abort when loading
 zones. [GL #339]
 1.7 License
 BIND is open source software licenced under the terms of the Mozilla
 Public License, version 2.0 (see
 the LICENSE file for the full text).
 The license requires that if you make changes to BIND and distribute them
 outside your organization,
 those changes must be published under the same license. It does not
 require that you publish or
 disclose anything other than the changes you have made to our software.
 This requirement does not
 affect anyone who is using BIND, with or without modifications, without
 redistributing it, nor anyone
 redistributing BIND without changes.
 Those wishing to discuss license compliance may contact ISC at
 https://www.isc.org/mission/contact/.
 1.8 End of Life
 The end-of-life date for BIND 9.12 has not yet been determined. However,
 it is not intended to be an
 Extended Support Version (ESV) branch; accordingly, support will end after
 the next stable branch (9.14)
 becomes available. Those needing a longer-lived branch are encouraged to
 use the current ESV, BIND
 9.11, which will be supported until December 2021. See
 https://www.isc.org/downloads/softwaresupport-policy/
 for details of ISC’s software support policy.
 1.9 Thank You
 Thank you to everyone who assisted us in making this release possible. If
 you would like to contribute
 to ISC to assist us in continuing to make quality open source software,
 please visit our donations page
 at http://www.isc.org/donate/.
 2
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/11442>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to