#10268: bind9-9.11.2-P1
-------------------------+-----------------------
 Reporter:  bdubbs@…     |       Owner:  bdubbs@…
     Type:  enhancement  |      Status:  assigned
 Priority:  normal       |   Milestone:  8.2
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:
 Keywords:               |
-------------------------+-----------------------

Comment (by bdubbs@…):

 ftp://ftp.isc.org/isc/bind9/9.11.2-P1/RELEASE-NOTES-bind-9.11.2-P1.txt

 BIND 9.11.2-P1 addresses the security issue described in CVE-2017-3145.

 New DNSSEC Root Key
  - This release includes an updated version of the bind.keys file
    containing the new root key. This file can also be downloaded from
    https://www.isc.org/bind-keys

 License Change
  - With the release of BIND 9.11.0, ISC changed to the open source license
    for BIND from the ISC license to the Mozilla Public License (MPL 2.0).

 Windows XP No Longer Supported

 Security Fixes

      * Addresses could be referenced after being freed during resolver
        processing, causing an assertion failure. The chances of this
        happening were remote, but the introduction of a delay in
        resolution increased them. (The delay will be addressed in an
        upcoming maintenance release.) This bug is disclosed in
        CVE-2017-3145. [RT #46839]
      * An error in TSIG handling could permit unauthorized zone transfers
        or zone updates. These flaws are disclosed in CVE-2017-3142 and
        CVE-2017-3143. [RT #45383]
      * The BIND installer on Windows used an unquoted service path, which
        can enable privilege escalation. This flaw is disclosed in
        CVE-2017-3141. [RT #45229]
      * With certain RPZ configurations, a response with TTL 0 could cause
        named to go into an infinite query loop. This flaw is disclosed in
        CVE-2017-3140. [RT #45181]

 Feature Changes

      * dig +ednsopt now accepts the names for EDNS options in addition to
        numeric values. For example, an EDNS Client-Subnet option could be
        sent using dig +ednsopt=ecs:.... Thanks to John Worley of Secure64
        for the contribution. [RT #44461]
      * Threads in named are now set to human-readable names to assist
        debugging on operating systems that support that. Threads will have
        names such as "isc-timer", "isc-sockmgr", "isc-worker0001", and so
        on. This will affect the reporting of subsidiary thread names in ps
        and top, but not the main thread. [RT #43234]
      * DiG now warns about .local queries which are reserved for Multicast
        DNS. [RT #44783]

 Bug Fixes

      * Fixed a bug that was introduced in an earlier development release
        which caused multi-packet AXFR and IXFR messages to fail validation
        if not all packets contained TSIG records; this caused
        interoperability problems with some other DNS implementations. [RT
        #45509]
      * Reloading or reconfiguring named could fail on some platforms when
        LMDB was in use. [RT #45203]
      * Due to some incorrectly deleted code, when BIND was built with
        LMDB, zones that were deleted via rndc delzone were removed from
        the running server but were not removed from the new zone database,
        so that deletion did not persist after a server restart. This has
        been corrected. [RT #45185]
      * Semicolons are no longer escaped when printing CAA and URI records.
        This may break applications that depend on the presence of the
        backslash before the semicolon. [RT #45216]
      * AD could be set on truncated answer with no records present in the
        answer and authority sections. [RT #45140]

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/10268#comment:2>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to