From 659e0d80fde14b5221eb3dfd08cdcdcd94cb2674 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Micha=C5=82=20K=C4=99pie=C5=84?= Date: Sun, 11 Feb 2024 12:10:17 +0100 Subject: [PATCH] Prepare release notes for BIND 9.16.48 --- doc/arm/notes.rst | 1 + doc/notes/notes-9.16.47.rst | 55 +++---------------------------- doc/notes/notes-9.16.48.rst | 65 +++++++++++++++++++++++++++++++++++++ 3 files changed, 71 insertions(+), 50 deletions(-) create mode 100644 doc/notes/notes-9.16.48.rst diff --git a/doc/arm/notes.rst b/doc/arm/notes.rst index 94e0ce43af..1fecc77586 100644 --- a/doc/arm/notes.rst +++ b/doc/arm/notes.rst @@ -46,6 +46,7 @@ for Microsoft Windows operating systems. .. include:: ../notes/notes-known-issues.rst +.. include:: ../notes/notes-9.16.48.rst .. include:: ../notes/notes-9.16.47.rst .. include:: ../notes/notes-9.16.46.rst .. include:: ../notes/notes-9.16.45.rst diff --git a/doc/notes/notes-9.16.47.rst b/doc/notes/notes-9.16.47.rst index 69a8a8b0f5..bf39c3d815 100644 --- a/doc/notes/notes-9.16.47.rst +++ b/doc/notes/notes-9.16.47.rst @@ -12,54 +12,9 @@ Notes for BIND 9.16.47 ---------------------- -Security Fixes -~~~~~~~~~~~~~~ +.. note:: -- Validating DNS messages containing a lot of DNSSEC signatures could - cause excessive CPU load, leading to a denial-of-service condition. - This has been fixed. :cve:`2023-50387` - - ISC would like to thank Elias Heftrig, Haya Schulmann, Niklas Vogel, - and Michael Waidner from the German National Research Center for - Applied Cybersecurity ATHENE for bringing this vulnerability to our - attention. :gl:`#4424` - -- Parsing DNS messages with many different names could cause excessive - CPU load. This has been fixed. :cve:`2023-4408` - - ISC would like to thank Shoham Danino from Reichman University, Anat - Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv - University, and Yuval Shavitt from Tel-Aviv University for bringing - this vulnerability to our attention. :gl:`#4234` - -- Specific queries could cause :iscman:`named` to crash with an - assertion failure when ``nxdomain-redirect`` was enabled. This has - been fixed. :cve:`2023-5517` :gl:`#4281` - -- A bad interaction between DNS64 and serve-stale could cause - :iscman:`named` to crash with an assertion failure, when both of these - features were enabled. This has been fixed. :cve:`2023-5679` - :gl:`#4334` - -- Query patterns that continuously triggered cache database maintenance - could cause an excessive amount of memory to be allocated, exceeding - ``max-cache-size`` and potentially leading to all available memory on - the host running :iscman:`named` being exhausted. This has been fixed. - :cve:`2023-6516` - - ISC would like to thank Infoblox for bringing this vulnerability to - our attention. :gl:`#4383` - -Removed Features -~~~~~~~~~~~~~~~~ - -- Support for using AES as the DNS COOKIE algorithm (``cookie-algorithm - aes;``) has been deprecated and will be removed in a future release. - Please use the current default, SipHash-2-4, instead. :gl:`#4421` - -Known Issues -~~~~~~~~~~~~ - -- There are no new known issues with this release. See :ref:`above - ` for a list of all known issues affecting this - BIND 9 branch. + The BIND 9.16.47 release was withdrawn after the discovery of a + regression in a security fix in it during pre-release testing. ISC + would like to acknowledge the assistance of Vinzenz Vogel and Daniel + Stirnimann of SWITCH. diff --git a/doc/notes/notes-9.16.48.rst b/doc/notes/notes-9.16.48.rst new file mode 100644 index 0000000000..6521b42f4b --- /dev/null +++ b/doc/notes/notes-9.16.48.rst @@ -0,0 +1,65 @@ +.. Copyright (C) Internet Systems Consortium, Inc. ("ISC") +.. +.. SPDX-License-Identifier: MPL-2.0 +.. +.. This Source Code Form is subject to the terms of the Mozilla Public +.. License, v. 2.0. If a copy of the MPL was not distributed with this +.. file, you can obtain one at https://mozilla.org/MPL/2.0/. +.. +.. See the COPYRIGHT file distributed with this work for additional +.. information regarding copyright ownership. + +Notes for BIND 9.16.48 +---------------------- + +Security Fixes +~~~~~~~~~~~~~~ + +- Validating DNS messages containing a lot of DNSSEC signatures could + cause excessive CPU load, leading to a denial-of-service condition. + This has been fixed. :cve:`2023-50387` + + ISC would like to thank Elias Heftrig, Haya Schulmann, Niklas Vogel, + and Michael Waidner from the German National Research Center for + Applied Cybersecurity ATHENE for bringing this vulnerability to our + attention. :gl:`#4424` + +- Parsing DNS messages with many different names could cause excessive + CPU load. This has been fixed. :cve:`2023-4408` + + ISC would like to thank Shoham Danino from Reichman University, Anat + Bremler-Barr from Tel-Aviv University, Yehuda Afek from Tel-Aviv + University, and Yuval Shavitt from Tel-Aviv University for bringing + this vulnerability to our attention. :gl:`#4234` + +- Specific queries could cause :iscman:`named` to crash with an + assertion failure when ``nxdomain-redirect`` was enabled. This has + been fixed. :cve:`2023-5517` :gl:`#4281` + +- A bad interaction between DNS64 and serve-stale could cause + :iscman:`named` to crash with an assertion failure, when both of these + features were enabled. This has been fixed. :cve:`2023-5679` + :gl:`#4334` + +- Query patterns that continuously triggered cache database maintenance + could cause an excessive amount of memory to be allocated, exceeding + ``max-cache-size`` and potentially leading to all available memory on + the host running :iscman:`named` being exhausted. This has been fixed. + :cve:`2023-6516` + + ISC would like to thank Infoblox for bringing this vulnerability to + our attention. :gl:`#4383` + +Removed Features +~~~~~~~~~~~~~~~~ + +- Support for using AES as the DNS COOKIE algorithm (``cookie-algorithm + aes;``) has been deprecated and will be removed in a future release. + Please use the current default, SipHash-2-4, instead. :gl:`#4421` + +Known Issues +~~~~~~~~~~~~ + +- There are no new known issues with this release. See :ref:`above + ` for a list of all known issues affecting this + BIND 9 branch.