From: Mark Andrews Date: Tue, 31 May 2011 00:06:31 +0000 (+0000) Subject: update for 9.4-ESV-R5rc1 retag X-Git-Tag: v9.4-ESV-R5~36 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0df807f2dcf9202f6959c5225bbb1d320079c280;p=thirdparty%2Fbind9.git update for 9.4-ESV-R5rc1 retag --- diff --git a/RELEASE-NOTES-BIND-9.4-ESV.html b/RELEASE-NOTES-BIND-9.4-ESV.html index e2ff4d90f03..3be8ee77713 100644 --- a/RELEASE-NOTES-BIND-9.4-ESV.html +++ b/RELEASE-NOTES-BIND-9.4-ESV.html @@ -1,50 +1,33 @@ - - - -

-

Introduction

+

Introduction

- BIND 9.4-ESV-R5 is a maintenance release for BIND 9.4-ESV. + BIND 9.4-ESV-R5rc1 is the first release + candidate of BIND 9.4-ESV-R5.

- This document summarizes changes from BIND 9.4-ESV-R4 to BIND 9.4-ESV-R5. + This document summarizes changes from BIND 9.4-ESV-R4 to BIND 9.4-ESV-R5rc1. Please see the CHANGES file in the source code release for a complete list of all changes.

-

Download

+

Download

The latest release of BIND 9 software can always be found on our web site at - http://www.isc.org/software/bind. + http://www.isc.org/downloads/all. There you will find additional information about each release, source code, and some pre-compiled versions for certain operating systems.

-

Support

+

Support

Product support information is available on http://www.isc.org/services/support @@ -55,37 +38,43 @@

-

New Features

+

New Features

-

9.4-ESV-R5

+

9.4-ESV-R5rc1

None.

-

Feature Changes

+

Feature Changes

-

9.4-ESV-R5

+

9.4-ESV-R5rc1

None.

-

Security Fixes

+

Security Fixes

-

9.4-ESV-R5

+

9.4-ESV-R5rc1

  • A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled allows for a TCP DoS attack. Until there is a kernel fix, ISC is disabling SO_ACCEPTFILTER support in BIND. [RT #22589] +
  • +named, set up to be a caching resolver, is vulnerable to a +user querying a domain with very large resource record sets (RRSets) +when trying to negatively cache the response. Due to an off-by-one +error, caching the response could cause named to crash. [RT #24650] +[CVE-2011-1910]
-

Bug Fixes

+

Bug Fixes

-

9.4-ESV-R5

+

9.4-ESV-R5rc1

  • During RFC5011 processing some journal write errors were not detected. @@ -157,11 +146,14 @@ add setup.sh in order to resolve changing named.conf issue. [RT #23687] The autosign tests attempted to open ports within reserved ranges. Test now avoids those ports. [RT #23957] +
  • +Named could fail to validate zones list in a DLV that validated insecure +without using DLV and had DS records in the parent zone. [RT #24631]
-

Thank You

+

Thank You

Thank you to everyone who assisted us in making this release possible. diff --git a/RELEASE-NOTES-BIND-9.4-ESV.pdf b/RELEASE-NOTES-BIND-9.4-ESV.pdf index 40bdce8155b..a138ec839c2 100644 Binary files a/RELEASE-NOTES-BIND-9.4-ESV.pdf and b/RELEASE-NOTES-BIND-9.4-ESV.pdf differ diff --git a/RELEASE-NOTES-BIND-9.4-ESV.txt b/RELEASE-NOTES-BIND-9.4-ESV.txt index f810985eb8f..12cf76b14fc 100644 --- a/RELEASE-NOTES-BIND-9.4-ESV.txt +++ b/RELEASE-NOTES-BIND-9.4-ESV.txt @@ -2,16 +2,16 @@ Introduction - BIND 9.4-ESV-R5 is a maintenance release for BIND 9.4-ESV. + BIND 9.4-ESV-R5rc1 is the first release candidate of BIND 9.4-ESV-R5. This document summarizes changes from BIND 9.4-ESV-R4 to BIND - 9.4-ESV-R5. Please see the CHANGES file in the source code release for - a complete list of all changes. + 9.4-ESV-R5rc1. Please see the CHANGES file in the source code release + for a complete list of all changes. Download The latest release of BIND 9 software can always be found on our web - site at http://www.isc.org/software/bind. There you will find + site at http://www.isc.org/downloads/all. There you will find additional information about each release, source code, and some pre-compiled versions for certain operating systems. @@ -25,27 +25,32 @@ Support New Features -9.4-ESV-R5 +9.4-ESV-R5rc1 None. Feature Changes -9.4-ESV-R5 +9.4-ESV-R5rc1 None. Security Fixes -9.4-ESV-R5 +9.4-ESV-R5rc1 * A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled allows for a TCP DoS attack. Until there is a kernel fix, ISC is disabling SO_ACCEPTFILTER support in BIND. [RT #22589] + * named, set up to be a caching resolver, is vulnerable to a user + querying a domain with very large resource record sets (RRSets) + when trying to negatively cache the response. Due to an off-by-one + error, caching the response could cause named to crash. [RT #24650] + [CVE-2011-1910] Bug Fixes -9.4-ESV-R5 +9.4-ESV-R5rc1 * During RFC5011 processing some journal write errors were not detected. This could lead to managed-keys changes being committed @@ -99,6 +104,9 @@ Bug Fixes setup.sh in order to resolve changing named.conf issue. [RT #23687] * The autosign tests attempted to open ports within reserved ranges. Test now avoids those ports. [RT #23957] + * Named could fail to validate zones list in a DLV that validated + insecure without using DLV and had DS records in the parent zone. + [RT #24631] Thank You