]> git.ipfire.org Git - thirdparty/bind9.git/commitdiff
Add CHANGES and release note for [GL #2899]
authorOndřej Surý <ondrej@sury.org>
Fri, 24 Sep 2021 07:58:47 +0000 (09:58 +0200)
committerMichał Kępień <michal@isc.org>
Mon, 11 Oct 2021 11:23:25 +0000 (13:23 +0200)
CHANGES
doc/arm/notes-9.11.36.xml

diff --git a/CHANGES b/CHANGES
index df56aa342a302db3efce3b8d9817042f466205f9..d95d870a5cc06d061ab2437af9b5471fcdc48133 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -1,3 +1,9 @@
+5736.  [security]      The "lame-ttl" option is now forcibly set to 0. This
+                       effectively disables the lame server cache, as it could
+                       previously be abused by an attacker to significantly
+                       degrade resolver performance. (CVE-2021-25219)
+                       [GL #2899]
+
 5716.  [bug]           Multiple library names were mistakenly passed to the
                        krb5-config utility when ./configure was invoked with
                        the --with-gssapi=[/path/to/]krb5-config option. This
index 1e04f9a717186ff8474296fd0dcffc49a49ab38f..ce848309742f19566bed488333a0d9aa18907cd0 100644 (file)
     <itemizedlist>
       <listitem>
         <para>
-          None.
+          The <command>lame-ttl</command> option controls how long
+          <command>named</command> caches certain types of broken responses from
+          authoritative servers (see the <link xmlns:xlink="http://www.w3.org/1999/xlink"
+          xlink:href="https://kb.isc.org/docs/cve-2021-25219">security advisory</link>
+          for details). This caching mechanism could be abused by an attacker to
+          significantly degrade resolver performance. The vulnerability has been
+          mitigated by changing the default value of <command>lame-ttl</command>
+          to <command>0</command> and overriding any explicitly set value with
+          <command>0</command>, effectively disabling this mechanism altogether.
+          ISC's testing has determined that doing that has a negligible impact
+          on resolver performance while also preventing abuse. Administrators
+          may observe more traffic towards servers issuing certain types of
+          broken responses than in previous BIND 9 releases, depending on client
+          query patterns. (CVE-2021-25219)
+        </para>
+        <para>
+          ISC would like to thank Kishore Kumar Kothapalli of Infoblox for
+          bringing this vulnerability to our attention. [GL #2899]
         </para>
       </listitem>
     </itemizedlist>