From: Nicki Křížek Date: Thu, 8 Jan 2026 15:42:51 +0000 (+0100) Subject: Prepare release notes for BIND 9.18.44 X-Git-Tag: v9.18.44~1^2~1 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=dd6998527c196ad522b95ae6280820ea7122cdd9;p=thirdparty%2Fbind9.git Prepare release notes for BIND 9.18.44 --- diff --git a/doc/arm/notes.rst b/doc/arm/notes.rst index 2f32c5622c2..9ff2fe7abea 100644 --- a/doc/arm/notes.rst +++ b/doc/arm/notes.rst @@ -45,6 +45,7 @@ The list of known issues affecting the latest version in the 9.18 branch can be found at https://gitlab.isc.org/isc-projects/bind9/-/wikis/Known-Issues-in-BIND-9.18 +.. include:: ../notes/notes-9.18.44.rst .. include:: ../notes/notes-9.18.43.rst .. include:: ../notes/notes-9.18.42.rst .. include:: ../notes/notes-9.18.41.rst diff --git a/doc/notes/notes-9.18.44.rst b/doc/notes/notes-9.18.44.rst new file mode 100644 index 00000000000..6961232164b --- /dev/null +++ b/doc/notes/notes-9.18.44.rst @@ -0,0 +1,42 @@ +.. Copyright (C) Internet Systems Consortium, Inc. ("ISC") +.. +.. SPDX-License-Identifier: MPL-2.0 +.. +.. This Source Code Form is subject to the terms of the Mozilla Public +.. License, v. 2.0. If a copy of the MPL was not distributed with this +.. file, you can obtain one at https://mozilla.org/MPL/2.0/. +.. +.. See the COPYRIGHT file distributed with this work for additional +.. information regarding copyright ownership. + +Notes for BIND 9.18.44 +---------------------- + +Security Fixes +~~~~~~~~~~~~~~ + +- [CVE-2025-13878] Fix incorrect length checks for BRID and HHIT + records. + + Malformed BRID and HHIT records could trigger an assertion failure. + This has been fixed. + + ISC would like to thank Vlatko Kosturjak from Marlink Cyber for + bringing this vulnerability to our attention. :gl:`#5616` + +Bug Fixes +~~~~~~~~~ + +- Allow glue in delegations with QTYPE=ANY. + + When a query for type ANY triggered a delegation response, all + additional data was omitted from the response, including mandatory + glue. This has been corrected. :gl:`#5659` + +- Reconfigure NSEC3 opt-out zone to NSEC causes zone to be invalid. + + A zone that is signed with NSEC3, opt-out enabled, and then + reconfigured to use NSEC, causes the zone to be published with missing + NSEC records. This has been fixed. :gl:`#5679` + +