Changes between Initial Version and Version 2 of Ticket #13680


Ignore:
Timestamp:
06/18/2020 02:16:27 AM (4 years ago)
Author:
Bruce Dubbs
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #13680

    • Property Owner changed from blfs-book to Bruce Dubbs
    • Property Status newassigned
  • Ticket #13680 – Description

    initial v2  
    11New security release
    22
    3 {{{
     3ISC has posted the announcement below to our public "bind-announce" list,
     4completing the disclosure of two medium-severity vulnerabilities,
     5CVE-2020-8618 and CVE-2020-8619.
    46
     7Package maintainers and distributors who have been holding updated
     8packages in anticipation of our disclosure are free to proceed
     9now that this information has been made public.
    510
    6 ISC has posted the announcement below to our public "bind-announce" list, completing
    7 the disclosure of two medium-severity vulnerabilities, CVE-2020-8618 and CVE-2020-8619.
     11Thank you to all those who received the information in advance for your
     12cooperation with our embargo period.
    813
    9 Package maintainers and distributors who have been holding updated packages in
    10 anticipation of our disclosure are free to proceed now that this information has
    11 been made public.
    12 
    13 Thank you to all those who received the information in advance for your cooperation
    14 with our embargo period.
    15 
    16 Michael McNally
    17 ISC Security Officer
    18 
    19 -----
     14Michael McNally - ISC Security Officer
    2015
    2116ISC's June maintenance releases of BIND are available and can be downloaded
     
    2621current supported stable branches:
    2722
    28   9.11.20 - https://downloads.isc.org/isc/bind9/9.11.20/RELEASE-NOTES-bind-9.11.20.html
    29   9.16.4  - https://downloads.isc.org/isc/bind9/9.16.4/RELEASE-NOTES-bind-9.16.4.html
     23- 9.11.20 -
     24  https://downloads.isc.org/isc/bind9/9.11.20/RELEASE-NOTES-bind-9.11.20.html
     25- 9.16.4  -
     26  https://downloads.isc.org/isc/bind9/9.16.4/RELEASE-NOTES-bind-9.16.4.html
     27
    3028
    3129experimental development branch:
    3230
    33   9.17.2  - https://downloads.isc.org/isc/bind9/9.17.2/RELEASE-NOTES-bind-9.17.2.html
     31- 9.17.2 -
     32  https://downloads.isc.org/isc/bind9/9.17.2/RELEASE-NOTES-bind-9.17.2.html
    3433
    3534In addition to minor bug fixes and feature improvements, these particular
    3635maintenance releases of BIND also contain fixes for two medium-severity
    37 vulnerabilities, CVE-2020-8618 and CVE-2020-8619, about which more information
    38 is available in these Security Advisories:
     36vulnerabilities, CVE-2020-8618 and CVE-2020-8619, about which more information is available in these Security Advisories:
    3937
    40   https://kb.isc.org/docs/cve-2020-8618
    41   https://kb.isc.org/docs/cve-2020-8619
    42 }}}
     38- https://kb.isc.org/docs/cve-2020-8618
     39- https://kb.isc.org/docs/cve-2020-8619
    4340
    44 The release notes:
    4541
    46 {{{
     42The release notes: Notes for BIND 9.16.4
    4743
    48 Notes for BIND 9.16.4
    4944Security Fixes
    5045
    51     It was possible to trigger an assertion when attempting to fill an oversized TCP buffer. This was disclosed in CVE-2020-8618. [GL #1850]
    52     It was possible to trigger an INSIST failure when a zone with an interior wildcard label was queried in a certain pattern. This was disclosed in CVE-2020-8619. [GL #1111] [GL #1718]
     46It was possible to trigger an assertion when attempting to fill an oversized
     47TCP buffer. This was disclosed in CVE-2020-8618.
     48   
     49It was possible to trigger an INSIST failure when a zone with an interior wildcard label was queried in a certain pattern. This was disclosed in CVE-2020-8619.
    5350
    5451New Features
    5552
    56     Documentation was converted from DocBook to reStructuredText. The BIND 9 ARM is now generated using Sphinx and published on Read the Docs. Release notes are no longer available as a separate document accompanying a release. [GL #83]
    57     named and named-checkzone now reject master zones that have a DS RRset at the zone apex. Attempts to add DS records at the zone apex via UPDATE will be logged but otherwise ignored. DS records belong in the parent zone, not at the zone apex. [GL #1798]
    58     dig and other tools can now print the Extended DNS Error (EDE) option when it appears in a request or a response. [GL #1835]
     53Documentation was converted from DocBook to reStructuredText. The BIND 9 ARM is now generated using Sphinx and published on Read the Docs. Release notes are no longer available as a separate document accompanying a release.
     54
     55named and named-checkzone now reject master zones that have a DS RRset at the
     56zone apex. Attempts to add DS records at the zone apex via UPDATE will be
     57logged but otherwise ignored. DS records belong in the parent zone, not
     58at the zone apex.
     59
     60dig and other tools can now print the Extended DNS Error (EDE)
     61option when it appears in a request or a response.
    5962
    6063Feature Changes
    6164
    62     The default value of max-stale-ttl has changed from 1 week to 12 hours. This option controls how long named retains expired RRsets in cache as a potential mitigation mechanism, should there be a problem with one or more domains. Note that cache content retention is independent of whether stale answers are used in response to client queries (stale-answer-enable yes|no and rndc serve-stale on|off). Serving of stale answers when the authoritative servers are not responding must be explicitly enabled, whereas the retention of expired cache content takes place automatically on all versions of BIND 9 that have this feature available. [GL #1877]
     65The default value of max-stale-ttl has changed from 1 week to 12 hours.
     66This option controls how long named retains expired RRsets in cache as a
     67potential mitigation mechanism, should there be a problem with one or more
     68domains. Note that cache content retention is independent of whether stale
     69answers are used in response to client queries (stale-answer-enable yes|no and
     70rndc serve-stale on|off). Serving of stale answers when the authoritative
     71servers are not responding must be explicitly enabled, whereas the retention
     72of expired cache content takes place automatically on all versions of BIND 9
     73that have this feature available.
    6374
    6475    Warning
    6576
    66     This change may be significant for administrators who expect that stale cache content will be automatically retained for up to 1 week. Add option max-stale-ttl 1w; to named.conf to keep the previous behavior of named.
     77This change may be significant for administrators who expect that
     78stale cache content will be automatically retained for up to 1 week.
     79Add option max-stale-ttl 1w; to named.conf to keep the previous
     80behavior of named.
    6781
    68     listen-on-v6 { any; } creates a separate socket for each interface. Previously, just one socket was created on systems conforming to RFC 3493 and RFC 3542. This change was introduced in BIND 9.16.0, but it was accidentally omitted from documentation. [GL #1782]
     82listen-on-v6 { any; } creates a separate socket for each interface.
     83Previously, just one socket was created on systems conforming to RFC 3493 and
     84RFC 3542. This change was introduced in BIND 9.16.0, but it was accidentally
     85omitted from documentation.
    6986
    7087Bug Fixes
    7188
    72     When fully updating the NSEC3 chain for a large zone via IXFR, a temporary loss of performance could be experienced on the secondary server when answering queries for nonexistent data that required DNSSEC proof of non-existence (in other words, queries that required the server to find and to return NSEC3 data). The unnecessary processing step that was causing this delay has now been removed. [GL #1834]
    73     named could crash with an assertion failure if the name of a database node was looked up while the database was being modified. [GL #1857]
    74     A possible deadlock in lib/isc/unix/socket.c was fixed. [GL #1859]
    75     Previously, named did not destroy some mutexes and conditional variables in netmgr code, which caused a memory leak on FreeBSD. This has been fixed. [GL #1893]
    76     A data race in lib/dns/resolver.c:log_formerr() that could lead to an assertion failure was fixed. [GL #1808]
    77     Previously, provide-ixfr no; failed to return up-to-date responses when the serial number was greater than or equal to the current serial number. [GL #1714]
    78     A bug in dnssec-policy keymgr was fixed, where the check for the existence of a given key’s successor would incorrectly return true if any other key in the keyring had a successor. [GL #1845]
    79     With dnssec-policy, when creating a successor key, the “goal” state of the current active key (the predecessor) was not changed and thus never removed from the zone. [GL #1846]
    80     named-checkconf -p could include spurious text in server-addresses statements due to an uninitialized DSCP value. This has been fixed. [GL #1812]
    81     The ARM has been updated to indicate that the TSIG session key is generated when named starts, regardless of whether it is needed. [GL #1842]
    82 }}}
     89When fully updating the NSEC3 chain for a large zone via IXFR, a temporary
     90loss of performance could be experienced on the secondary server when
     91answering queries for nonexistent data that required DNSSEC proof of non-
     92existence (in other words, queries that required the server to find and to
     93return NSEC3 data). The unnecessary processing step that was causing this
     94delay has now been removed.
     95
     96named could crash with an assertion failure if the name of a
     97database node was looked up while the database was being modified.
     98
     99A possible deadlock in lib/isc/unix/socket.c was fixed.
     100
     101Previously, named did not destroy some mutexes and conditional variables in
     102netmgr code, which caused a memory leak on FreeBSD. This has been fixed.
     103
     104A data race in lib/dns/resolver.c:log_formerr() that could lead to an
     105assertion failure was fixed.
     106   
     107Previously, provide-ixfr no; failed to return up-to-date responses when the serial
     108number was greater than or equal to the current serial number.
     109
     110A bug in dnssec-policy keymgr was fixed, where the check for the existence of a
     111given key’s successor would incorrectly return true if any other key in the
     112keyring had a successor.
     113
     114With dnssec-policy, when creating a successor key, the “goal” state of the
     115current active key (the predecessor) was not changed and thus never removed
     116from the zone.
     117
     118named-checkconf -p could include spurious text in server-addresses
     119statements due to an uninitialized DSCP value. This has been fixed.
     120
     121The ARM has been updated to indicate that the TSIG session key is generated
     122when named starts, regardless of whether it is needed.
     123