2022-04-12 13:41:18 +02:00
|
|
|
.. Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
|
|
..
|
|
|
|
.. SPDX-License-Identifier: MPL-2.0
|
|
|
|
..
|
|
|
|
.. This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
.. License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
.. file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
..
|
|
|
|
.. See the COPYRIGHT file distributed with this work for additional
|
|
|
|
.. information regarding copyright ownership.
|
|
|
|
|
2023-08-07 10:23:55 +02:00
|
|
|
Notes for BIND 9.19.17
|
2023-01-13 15:35:32 +01:00
|
|
|
----------------------
|
2022-04-12 13:41:18 +02:00
|
|
|
|
|
|
|
Security Fixes
|
|
|
|
~~~~~~~~~~~~~~
|
|
|
|
|
2023-06-20 15:38:40 +10:00
|
|
|
- Previously, sending a specially crafted message over the control
|
|
|
|
channel could cause the packet-parsing code to run out of available
|
|
|
|
stack memory, causing :iscman:`named` to terminate unexpectedly.
|
2023-08-31 18:55:36 +02:00
|
|
|
This has been fixed. :cve:`2023-3341`
|
2023-06-20 15:38:40 +10:00
|
|
|
|
|
|
|
ISC would like to thank Eric Sesterhenn from X41 D-Sec GmbH for
|
|
|
|
bringing this vulnerability to our attention. :gl:`#4152`
|
2022-04-12 13:41:18 +02:00
|
|
|
|
|
|
|
New Features
|
|
|
|
~~~~~~~~~~~~
|
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- Support for User Statically Defined Tracing (USDT) probes has been
|
|
|
|
added. These probes enable fine-grained application tracing and
|
|
|
|
introduce no overhead when they are not enabled. :gl:`#4041`
|
2023-03-30 15:32:59 +02:00
|
|
|
|
2023-09-08 10:00:58 +02:00
|
|
|
- The client-side support of the EDNS EXPIRE option has been expanded to
|
|
|
|
include IXFR and AXFR query types. This enhancement enables
|
|
|
|
:iscman:`named` to perform AXFR and IXFR queries while incorporating
|
|
|
|
the EDNS EXPIRE option. :gl:`#4170`
|
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Removed Features
|
|
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- The :any:`dnssec-must-be-secure` option has been deprecated and will
|
|
|
|
be removed in a future release. :gl:`#4263`
|
2023-03-22 15:06:58 -07:00
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Feature Changes
|
|
|
|
~~~~~~~~~~~~~~~
|
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- Compiling with jemalloc versions older than 4.0.0 is no longer
|
|
|
|
supported; those versions do not provide the features required by
|
|
|
|
current BIND 9 releases. :gl:`#4296`
|
2023-09-05 14:38:55 +02:00
|
|
|
|
2023-09-08 10:00:58 +02:00
|
|
|
- If the ``server`` command is specified, :iscman:`nsupdate` now honors
|
|
|
|
the :option:`nsupdate -v` option for SOA queries by sending both the
|
|
|
|
UPDATE request and the initial query over TCP. :gl:`#1181`
|
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Bug Fixes
|
|
|
|
~~~~~~~~~
|
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- The value of the If-Modified-Since header in the statistics channel
|
|
|
|
was not being correctly validated for its length, potentially allowing
|
|
|
|
an authorized user to trigger a buffer overflow. Ensuring the
|
|
|
|
statistics channel is configured correctly to grant access exclusively
|
|
|
|
to authorized users is essential (see the :any:`statistics-channels`
|
|
|
|
block definition and usage section). :gl:`#4124`
|
2023-08-14 11:20:41 +02:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
This issue was reported independently by Eric Sesterhenn of X41 D-Sec
|
|
|
|
GmbH and Cameron Whitehead.
|
2023-08-21 15:15:26 +02:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- The Content-Length header in the statistics channel was lacking proper
|
|
|
|
bounds checking. A negative or excessively large value could
|
|
|
|
potentially trigger an integer overflow and result in an assertion
|
|
|
|
failure. :gl:`#4125`
|
2023-06-28 12:01:58 +10:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
This issue was reported by Eric Sesterhenn of X41 D-Sec GmbH.
|
2023-06-28 12:01:58 +10:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- Several memory leaks caused by not clearing the OpenSSL error stack
|
|
|
|
were fixed. :gl:`#4159`
|
2023-08-21 15:15:26 +02:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
This issue was reported by Eric Sesterhenn of X41 D-Sec GmbH.
|
2023-08-14 11:20:41 +02:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- The introduction of ``krb5-subdomain-self-rhs`` and
|
|
|
|
``ms-subdomain-self-rhs`` UPDATE policies accidentally caused
|
|
|
|
:iscman:`named` to return SERVFAIL responses to deletion requests for
|
|
|
|
non-existent PTR and SRV records. This has been fixed. :gl:`#4280`
|
2023-08-28 12:28:35 +10:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- The :any:`stale-refresh-time` feature was mistakenly disabled when the
|
|
|
|
server cache was flushed by :option:`rndc flush`. This has been fixed.
|
|
|
|
:gl:`#4278`
|
2023-08-24 11:49:52 +02:00
|
|
|
|
2023-09-06 20:16:01 +02:00
|
|
|
- BIND's memory consumption has been improved by implementing dedicated
|
|
|
|
jemalloc memory arenas for sending buffers. This optimization ensures
|
|
|
|
that memory usage is more efficient and better manages the return of
|
|
|
|
memory pages to the operating system. :gl:`#4038`
|
2023-08-14 16:17:54 +03:00
|
|
|
|
2022-11-07 14:03:15 +01:00
|
|
|
Known Issues
|
|
|
|
~~~~~~~~~~~~
|
|
|
|
|
2023-03-07 14:10:26 +01:00
|
|
|
- There are no new known issues with this release. See :ref:`above
|
|
|
|
<relnotes_known_issues>` for a list of all known issues affecting this
|
|
|
|
BIND 9 branch.
|