Opened 7 months ago

Closed 7 months ago

#18619 closed enhancement (fixed)

bind9 bind 9.18.19

Reported by: Douglas R. Reno Owned by: Douglas R. Reno
Priority: elevated Milestone: 12.1
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version

Contains two security fixes

Change History (3)

comment:1 by Douglas R. Reno, 7 months ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

comment:2 by Douglas R. Reno, 7 months ago

Notes for BIND 9.18.19
Security Fixes

    Previously, sending a specially crafted message over the control channel could cause 
the packet-parsing code to run out of available stack memory, causing named to terminate 
unexpectedly. This has been fixed. (CVE-2023-3341)

    ISC would like to thank Eric Sesterhenn from X41 D-Sec GmbH for bringing this 
vulnerability to our attention. [GL #4152]

    A flaw in the networking code handling DNS-over-TLS queries could cause named to 
terminate unexpectedly due to an assertion failure under significant DNS-over-TLS query 
load. This has been fixed. (CVE-2023-4236)

    ISC would like to thank Robert Story from USC/ISI Root Server Operations for 
bringing this vulnerability to our attention. [GL #4242]

Removed Features

    The dnssec-must-be-secure option has been deprecated and will be removed in a future 
release. [GL #4263]

Feature Changes

    If the server command is specified, nsupdate now honors the nsupdate -v option for 
SOA queries by sending both the UPDATE request and the initial query over TCP. [GL 
#1181]

Bug Fixes

    The value of the If-Modified-Since header in the statistics channel was not being 
correctly validated for its length, potentially allowing an authorized user to trigger a 
buffer overflow. Ensuring the statistics channel is configured correctly to grant access 
exclusively to authorized users is essential (see the statistics-channels block 
definition and usage section). [GL #4124]

    This issue was reported independently by Eric Sesterhenn of X41 D-Sec GmbH and 
Cameron Whitehead.

    The Content-Length header in the statistics channel was lacking proper bounds 
checking. A negative or excessively large value could potentially trigger an integer 
overflow and result in an assertion failure. [GL #4125]

    This issue was reported by Eric Sesterhenn of X41 D-Sec GmbH.

    Several memory leaks caused by not clearing the OpenSSL error stack were fixed. [GL 
#4159]

    This issue was reported by Eric Sesterhenn of X41 D-Sec GmbH.

    The introduction of krb5-subdomain-self-rhs and ms-subdomain-self-rhs UPDATE 
policies accidentally caused named to return SERVFAIL responses to deletion requests for 
non-existent PTR and SRV records. This has been fixed. [GL #4280]

    The stale-refresh-time feature was mistakenly disabled when the server cache was 
flushed by rndc flush. This has been fixed. [GL #4278]

    BIND’s memory consumption has been improved by implementing dedicated jemalloc 
memory arenas for sending buffers. This optimization ensures that memory usage is more 
efficient and better manages the return of memory pages to the operating system. [GL 
#4038]

    Previously, partial writes in the TLS DNS code were not accounted for correctly, 
which could have led to DNS message corruption. This has been fixed. [GL #4255]

comment:3 by Douglas R. Reno, 7 months ago

Resolution: fixed
Status: assignedclosed

Fixed at 850ac6f0306f24a1552ba520ba68de1ef05cc0e4

SA-12.0-011 issued

Note: See TracTickets for help on using tickets.