2022-04-12 13:41:18 +02:00
|
|
|
.. Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
|
|
..
|
|
|
|
.. SPDX-License-Identifier: MPL-2.0
|
|
|
|
..
|
|
|
|
.. This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
.. License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
.. file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
..
|
|
|
|
.. See the COPYRIGHT file distributed with this work for additional
|
|
|
|
.. information regarding copyright ownership.
|
|
|
|
|
2022-12-13 16:45:13 +01:00
|
|
|
Notes for BIND 9.19.9
|
2022-04-12 13:41:18 +02:00
|
|
|
---------------------
|
|
|
|
|
|
|
|
Security Fixes
|
|
|
|
~~~~~~~~~~~~~~
|
|
|
|
|
2022-09-01 16:34:21 -07:00
|
|
|
- An UPDATE message flood could cause :iscman:`named` to exhaust all
|
|
|
|
available memory. This flaw was addressed by adding a new
|
|
|
|
:any:`update-quota` option that controls the maximum number of
|
|
|
|
outstanding DNS UPDATE messages that :iscman:`named` can hold in a
|
2023-08-31 18:55:36 +02:00
|
|
|
queue at any given time (default: 100). :cve:`2022-3094`
|
2022-09-01 16:34:21 -07:00
|
|
|
|
|
|
|
ISC would like to thank Rob Schulhof from Infoblox for bringing this
|
|
|
|
vulnerability to our attention. :gl:`#3523`
|
2022-04-12 13:41:18 +02:00
|
|
|
|
2022-10-28 11:31:19 +11:00
|
|
|
- :iscman:`named` could crash with an assertion failure when an RRSIG
|
|
|
|
query was received and :any:`stale-answer-client-timeout` was set to a
|
2023-08-31 18:55:36 +02:00
|
|
|
non-zero value. This has been fixed. :cve:`2022-3736`
|
2022-10-28 11:31:19 +11:00
|
|
|
|
|
|
|
ISC would like to thank Borja Marcos from Sarenet (with assistance by
|
|
|
|
Iratxe Niño from Fundación Sarenet) for bringing this vulnerability to
|
|
|
|
our attention. :gl:`#3622`
|
|
|
|
|
2022-11-14 12:30:49 +00:00
|
|
|
- :iscman:`named` running as a resolver with the
|
|
|
|
:any:`stale-answer-client-timeout` option set to any value greater
|
|
|
|
than ``0`` could crash with an assertion failure, when the
|
|
|
|
:any:`recursive-clients` soft quota was reached. This has been fixed.
|
2023-08-31 18:55:36 +02:00
|
|
|
:cve:`2022-3924`
|
2022-11-14 12:30:49 +00:00
|
|
|
|
|
|
|
ISC would like to thank Maksym Odinintsev from AWS for bringing this
|
|
|
|
vulnerability to our attention. :gl:`#3619`
|
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
New Features
|
|
|
|
~~~~~~~~~~~~
|
|
|
|
|
2022-09-01 16:34:21 -07:00
|
|
|
- The new :any:`update-quota` option can be used to control the number
|
|
|
|
of simultaneous DNS UPDATE messages that can be processed to update an
|
|
|
|
authoritative zone on a primary server, or forwarded to the primary
|
|
|
|
server by a secondary server. The default is 100. A new statistics
|
|
|
|
counter has also been added to record events when this quota is
|
|
|
|
exceeded, and the version numbers for the XML and JSON statistics
|
|
|
|
schemas have been updated. :gl:`#3523`
|
2022-05-03 09:28:26 +00:00
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Removed Features
|
|
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- The statements setting alternate local addresses for inbound zone
|
|
|
|
transfers (``alt-transfer-source``, ``alt-transfer-source-v6``, and
|
|
|
|
``use-alt-transfer-source``) have been removed. :gl:`#3714`
|
2022-12-05 10:23:12 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- The Differentiated Services Code Point (DSCP) feature in BIND has been
|
|
|
|
non-operational since the new Network Manager was introduced in BIND
|
|
|
|
9.16. It is now marked as obsolete, and vestigial code implementing it
|
|
|
|
has been removed. Configuring DSCP values in ``named.conf`` now causes
|
|
|
|
a warning to be logged. :gl:`#3773`
|
2023-01-05 22:47:39 -08:00
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Feature Changes
|
|
|
|
~~~~~~~~~~~~~~~
|
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- A new way of configuring the preferred source address when talking to
|
|
|
|
remote servers, such as :any:`primaries` and :any:`parental-agents`,
|
|
|
|
has been added: setting the ``source`` and/or ``source-v6`` arguments
|
|
|
|
for a given statement is now possible. This new approach is intended
|
|
|
|
to eventually replace statements such as :any:`parental-source`,
|
|
|
|
:any:`parental-source-v6`, :any:`transfer-source`, etc. :gl:`#3762`
|
2022-11-23 08:18:32 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- The code for DNS over TCP and DNS over TLS transports has been
|
|
|
|
replaced with a new, unified transport implementation. :gl:`#3374`
|
2022-11-23 15:44:33 +02:00
|
|
|
|
2022-04-12 13:41:18 +02:00
|
|
|
Bug Fixes
|
|
|
|
~~~~~~~~~
|
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- A rare assertion failure was fixed in outgoing TCP DNS connection
|
|
|
|
handling. :gl:`#3178` :gl:`#3636`
|
|
|
|
|
|
|
|
- In addition to a previously fixed bug, another similar issue was
|
|
|
|
discovered where quotas could be erroneously reached for servers,
|
|
|
|
including any configured forwarders, resulting in SERVFAIL answers
|
|
|
|
being sent to clients. This has been fixed. :gl:`#3752`
|
2022-12-07 16:52:07 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- In certain query resolution scenarios (e.g. when following CNAME
|
|
|
|
records), :iscman:`named` configured to answer from stale cache could
|
|
|
|
return a SERVFAIL response despite a usable, non-stale answer being
|
|
|
|
present in the cache. This has been fixed. :gl:`#3678`
|
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- When an outgoing request timed out, :iscman:`named` would retry up to
|
|
|
|
three times with the same server instead of trying the next available
|
|
|
|
name server. This has been fixed. :gl:`#3637`
|
2022-12-12 20:05:54 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- Recently used ADB names and ADB entries (IP addresses) could get
|
|
|
|
cleaned when ADB was under memory pressure. To mitigate this, only
|
|
|
|
actual ADB names and ADB entries are now counted (excluding internal
|
|
|
|
memory structures used for "housekeeping") and recently used (<= 10
|
|
|
|
seconds) ADB names and entries are excluded from the overmem memory
|
|
|
|
cleaner. :gl:`#3739`
|
2022-12-14 14:25:23 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- The "Prohibited" Extended DNS Error was inadvertently set in some
|
|
|
|
NOERROR responses. This has been fixed. :gl:`#3743`
|
2022-12-14 11:53:28 +01:00
|
|
|
|
2023-01-12 21:39:37 +01:00
|
|
|
- Previously, TLS session resumption could have led to handshake
|
|
|
|
failures when client certificates were used for authentication (Mutual
|
|
|
|
TLS). This has been fixed. :gl:`#3725`
|
|
|
|
|
2022-11-07 14:03:15 +01:00
|
|
|
Known Issues
|
|
|
|
~~~~~~~~~~~~
|
|
|
|
|
|
|
|
- There are no new known issues with this release. See :ref:`above
|
|
|
|
<relnotes_known_issues>` for a list of all known issues affecting this
|
|
|
|
BIND 9 branch.
|