Tweak and reword release notes

This commit is contained in:
Nicki Křížek
2024-06-12 14:05:05 +02:00
parent 10d2aceb02
commit 6d44c8fcbd

View File

@@ -15,32 +15,34 @@ Notes for BIND 9.19.25
Security Fixes
~~~~~~~~~~~~~~
- Malicious DNS client that sends many queries over TCP but never reads
responses can cause server to respond slowly or not respond at all for other
clients. :cve:`2024-0760` :gl:`#4481`
- A malicious DNS client that sent many queries over TCP but never read
the responses could cause a server to respond slowly or not at all for
other clients. This has been fixed. :cve:`2024-0760` :gl:`#4481`
- Excessively large resource record sets can be crafted to slow down
database processing. This has been addressed by adding a configurable
limit to the number of records that can be stored per name and type in
a cache or zone database. The default is 100, but it can be tuned with
the new ``max-records-per-type`` option. :gl:`#497` :gl:`#3405`
the new :any:`max-records-per-type` option. :gl:`#497` :gl:`#3405`
An excessively large number of resource record types for a single owner name can
be crafted to slow down database processing. This has been addressed by adding
a configurable limit to the number of records that can be stored per name and
type in a cache or zone database. The default is 100, and can be tuned with
the new ``max-rrtypes-per-name`` option. :cve:`2024-1737` :gl:`#3403`
An excessively large number of resource record types for a single owner
name can be crafted to slow down database processing. This has been
addressed by adding a configurable limit to the number of records that
can be stored per name and type in a cache or zone database. The
default is 100, and can be tuned with the new :any:`max-types-per-name`
option. :cve:`2024-1737` :gl:`#3403`
ISC would like to thank Toshifumi Sakaguchi who independently discovered
and responsibly reported the issue to ISC. :gl:`#4548`
ISC would like to thank Toshifumi Sakaguchi who independently
discovered and responsibly reported the issue to ISC. :gl:`#4548`
- A malicious DNS client that sends many queries with a SIG(0)-signed message
can cause server to respond slowly or not respond at all for other clients.
:cve:`2024-1975` :gl:`#4480`
- A malicious DNS client that sends many queries with a SIG(0)-signed
message can cause server to respond slowly or not respond at all for
other clients. This has been fixed. :cve:`2024-1975` :gl:`#4480`
- Due to a logic error, lookups that trigger serving stale data and require
lookups in local authoritative zone data may result in an assertion failure.
This has been fixed. :cve:`2024-4076` :gl:`#4507`
- Due to a logic error, lookups that triggered serving stale data and
required lookups in local authoritative zone data could have resulted
in an assertion failure. This has been fixed. :cve:`2024-4076`
:gl:`#4507`
New Features
~~~~~~~~~~~~
@@ -53,36 +55,36 @@ Feature Changes
~~~~~~~~~~~~~~~
- Outgoing zone transfers are no longer enabled by default. An explicit
:any:`allow-transfer` ACL must now be set at the :any:`zone`, :any:`view` or
:namedconf:ref:`options` level to enable outgoing transfers. :gl:`#4728`
:any:`allow-transfer` ACL must now be set at the :any:`zone`,
:any:`view`, or :namedconf:ref:`options` level to enable outgoing
transfers. :gl:`#4728`
Bug Fixes
~~~~~~~~~
- Command-line options for IPv4-only (:option:`named -4`) and IPv6-only
(:option:`named -6`) modes are now respected for zone primaries,
:any:`also-notify` and :any:`parental-agents`. :gl:`#3472`
(:option:`named -6`) modes are now respected for zone :any:`primaries`,
:any:`also-notify`, and :any:`parental-agents`. :gl:`#3472`
- An RPZ response's SOA record TTL was set to 1 instead of the SOA TTL, if
``add-soa`` was used. This has been fixed. :gl:`#3323`
- An RPZ response's SOA record TTL was set to 1 instead of the SOA TTL,
if ``add-soa`` was used. This has been fixed. :gl:`#3323`
- Potential data races were found in our DoH implementation related
to HTTP/2 session object management and endpoints set object
management after reconfiguration. These issues have been
fixed. :gl:`#4473`
- Potential data races were found in our DoH implementation, related to
HTTP/2 session object management and endpoints set object management
after reconfiguration. These issues have been fixed. :gl:`#4473`
ISC would like to thank Dzintars and Ivo from nic.lv for bringing
this to our attention.
ISC would like to thank Dzintars and Ivo from nic.lv for bringing this
to our attention.
- Some servers which couldn't be reached due EHOSTDOWN or ENETDOWN
conditions were incorrectly prioritized during server selection.
These are now properly handled as unreachable. :gl:`#4736`
- Some servers which could not be reached due to EHOSTDOWN or ENETDOWN
conditions were incorrectly prioritized during server selection. These
are now properly handled as unreachable. :gl:`#4736`
- When sending a TCP reset for a connection, on some systems
the libuv call may return an error code, which triggered an
assertion failure in `named`. This error condition is now
being dealt with in a more graceful manner, by logging the
incident and shutting down the connection. :gl:`#4708`
- On some systems the libuv call may return an error code when sending a
TCP reset for a connection, which triggers an assertion failure in
:iscman:`named`. This error condition is now dealt with in a more
graceful manner, by logging the incident and shutting down the
connection. :gl:`#4708`
Known Issues
~~~~~~~~~~~~