Commit Graph

29 Commits

Author SHA1 Message Date
Adolf Belka
405e359ee6 bind: Update to version 9.16.22
- Update from 9.11.32 to 9.16.22
- 9.11 is an ESV (Extended Support Version) that will go EOL in December 2021
  9.16 is the replacement ESV whose EOL is not yet defined but will be at least 4 years
   so should be supported until at least March 2024 as the 9.16 branch was started in 2020
- Update rootfile
- libuv is now required both to build the bind libraries and for the running of the
   utilities.
- Changelog is difficult to define here as this is a change of branch from 9.11 to 9.16
   both of which have been running in parallel. However all the changes from the start of
   9.16.0 can be found in the CHANGES file in the source tarball.
- nslookup, host and dig utilities tested out by installing this on a vm testbed. All
   these utilities worked as the previous version
   nsupdate was not able to be tested other than confirming that running nsupdate
   opened an interactive session. This utility would be good to be tested by someone
   familiar with how to run it.

Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2021-11-24 09:29:56 +00:00
Matthias Fischer
be1bf24bb0 bind: Update to 9.11.32
For details see:
https://downloads.isc.org/isc/bind9/9.11.31/RELEASE-NOTES-bind-9.11.32.html

"Notes for BIND 9.11.32
Feature Changes

    DNSSEC responses containing NSEC3 records with iteration counts
    greater than 150 are now treated as insecure. [GL #2445]

    The maximum supported number of NSEC3 iterations that can be
    configured for a zone has been reduced to 150. [GL #2642]

    The implementation of the ZONEMD RR type has been updated to match
    RFC 8976. [GL #2658]

Notes for BIND 9.11.31
Security Fixes

    A malformed incoming IXFR transfer could trigger an assertion
    failure in named, causing it to quit abnormally. (CVE-2021-25214)

    ISC would like to thank Greg Kuechle of SaskTel for bringing this
    vulnerability to our attention. [GL #2467]

    named crashed when a DNAME record placed in the ANSWER section
    during DNAME chasing turned out to be the final answer to a client
    query. (CVE-2021-25215)

    ISC would like to thank Siva Kakarla for bringing this vulnerability
    to our attention. [GL #2540]

    When a server's configuration set the tkey-gssapi-keytab
    or tkey-gssapi-credential option, a specially crafted GSS-TSIG query
    could cause a buffer overflow in the ISC implementation of SPNEGO
    (a protocol enabling negotiation of the security mechanism used for
    GSSAPI authentication). This flaw could be exploited to crash named
    binaries compiled for 64-bit platforms, and could enable remote code
    execution when named was compiled for 32-bit platforms.
    (CVE-2021-25216)

    This vulnerability was reported to us as ZDI-CAN-13347 by Trend
    Micro Zero Day Initiative. [GL #2604]

Feature Changes

    The ISC implementation of SPNEGO was removed from BIND 9 source
    code. Instead, BIND 9 now always uses the SPNEGO implementation
    provided by the system GSSAPI library when it is built with GSSAPI
    support. All major contemporary Kerberos/GSSAPI libraries contain
    an implementation of the SPNEGO mechanism. [GL #2607]

Notes for BIND 9.11.30

The BIND 9.11.30 release was withdrawn after a backporting bug was
discovered during pre-release testing. ISC would like to acknowledge the
assistance of Natan Segal of Bluecat Networks.2"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-05-25 09:46:28 +00:00
Matthias Fischer
788134d238 bind: Update to 9.11.29
For details see:
https://downloads.isc.org/isc/bind9/9.11.29/RELEASE-NOTES-bind-9.11.29.html

"Bug Fixes

An invalid direction field (not one of N, S, E, W) in a LOC record resulted
in an INSIST failure when a zone file containing such a record was loaded. [GL #2499]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-22 10:37:16 +00:00
Matthias Fischer
482634a1d3 bind: Update to 9.11.28
For details see:
https://downloads.isc.org/isc/bind9/9.11.28/RELEASE-NOTES-bind-9.11.28.html

"Notes for BIND 9.11.28
Security Fixes

When tkey-gssapi-keytab or tkey-gssapi-credential was configured,
a specially crafted GSS-TSIG query could cause a buffer overflow in the
ISC implementation of SPNEGO (a protocol enabling negotiation of the
security mechanism to use for GSSAPI authentication). This flaw could
be exploited to crash named. Theoretically, it also enabled remote code
execution, but achieving the latter is very difficult in real-world
conditions. (CVE-2020-8625)

This vulnerability was responsibly reported to us as ZDI-CAN-12302
by Trend Micro Zero Day Initiative. [GL #2354]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-02-19 19:32:28 +00:00
Matthias Fischer
34081d2f23 bind: Update to 9.11.26
For details see:
https://downloads.isc.org/isc/bind9/9.11.26/RELEASE-NOTES-bind-9.11.26.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-20 09:46:42 +00:00
Matthias Fischer
fde5772fde bind: Update to 9.11.25
For details see:
https://downloads.isc.org/isc/bind9/9.11.25/RELEASE-NOTES-bind-9.11.25.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-10 13:00:29 +00:00
Matthias Fischer
d690f2a7ce bind: Update to 9.11.21
For details see:
https://downloads.isc.org/isc/bind9/9.11.21/RELEASE-NOTES-bind-9.11.21.html

"Bug Fixes

    named could crash when cleaning dead nodes in lib/dns/rbtdb.c that
    were being reused. [GL #1968]

    Properly handle missing kyua command so that make check does not
    fail unexpectedly when CMocka is installed, but Kyua is not. [GL
    #1950]

    The validator could fail to accept a properly signed RRset if an
    unsupported algorithm appeared earlier in the DNSKEY RRset than
    a supported algorithm. It could also stop if it detected a malformed
    public key. [GL #1689]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-08-17 17:52:06 +00:00
Matthias Fischer
ba036c14cb bind: Update to 9.11.20
For details see:
https://downloads.isc.org/isc/bind9/9.11.20/RELEASE-NOTES-bind-9.11.20.html

"Security Fixes

    It was possible to trigger an INSIST failure when a zone with
    an interior wildcard label was queried in a certain pattern. This
    was disclosed in CVE-2020-8619. [GL #1111] [GL #1718]

New Features

    dig and other tools can now print the Extended DNS Error (EDE)
    option when it appears in a request or a response. [GL #1835]

Bug Fixes

    When fully updating the NSEC3 chain for a large zone via IXFR,
    a temporary loss of performance could be experienced on the
    secondary server when answering queries for nonexistent data that
    required DNSSEC proof of non-existence (in other words, queries that
    required the server to find and to return NSEC3 data). The
    unnecessary processing step that was causing this delay has now been
    removed. [GL #1834]

    A data race in lib/dns/resolver.c:log_formerr() that could lead
    to an assertion failure was fixed. [GL #1808]

    Previously, provide-ixfr no; failed to return up-to-date responses
    when the serial number was greater than or equal to the current
    serial number. [GL #1714]

    named-checkconf -p could include spurious text in server-addresses
    statements due to an uninitialized DSCP value. This has been fixed.
    [GL #1812]

    The ARM has been updated to indicate that the TSIG session key is
    generated when named starts, regardless of whether it is needed. [GL
    #1842]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-27 14:23:57 +00:00
Matthias Fischer
c7e79ba602 bind: Update to 9.11.19
For details see:
https://downloads.isc.org/isc/bind9/9.11.19/RELEASE-NOTES-bind-9.11.19.html

"Security Fixes

    To prevent exhaustion of server resources by a maliciously
    configured domain, the number of recursive queries that can be
    triggered by a request before aborting recursion has been further
    limited. Root and top-level domain servers are no longer exempt from
    the max-recursion-queries limit. Fetches for missing name server
    address records are limited to 4 for any domain. This issue was
    disclosed in CVE-2020-8616. [GL #1388]

    Replaying a TSIG BADTIME response as a request could trigger
    an assertion failure. This was disclosed in CVE-2020-8617. [GL
    #1703]

Feature Changes

    Message IDs in inbound AXFR transfers are now checked for
    consistency. Log messages are emitted for streams with inconsistent
    message IDs. [GL #1674]

Bug Fixes

    When running on a system with support for Linux capabilities, named
    drops root privileges very soon after system startup. This was
    causing a spurious log message, "unable to set effective uid to 0:
    Operation not permitted", which has now been silenced. [GL #1042]
    [GL #1090]

    When named-checkconf -z was run, it would sometimes incorrectly set
    its exit code. It reflected the status of the last view found;
    if zone-loading errors were found in earlier configured views but
    not in the last one, the exit code indicated success. Thanks
    to Graham Clinch. [GL #1807]

    When built without LMDB support, named failed to restart after
    a zone with a double quote (") in its name was added with rndc
    addzone. Thanks to Alberto Fernández. [GL #1695]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-05-19 19:45:02 +00:00
Arne Fitzenreiter
1bba20a985 bind: update rootfile 2020-04-22 02:41:49 +02:00
Matthias Fischer
454c77d4c4 bind: Update to 9.11.17
For details see:
https://downloads.isc.org/isc/bind9/9.11.17/RELEASE-NOTES-bind-9.11.17.html

"Notes for BIND 9.11.17

Feature Changes

The configure option --with-libxml2 now uses pkg-config to detect
libxml2 library availability. You will either have to install pkg-config
or specify the exact path where libxml2 has been installed on your
system. [GL #1635]

Bug Fixes

Fixed re-signing issues with inline zones which resulted in records
being re-signed late or not at all."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-28 18:38:24 +00:00
Arne Fitzenreiter
592d3708fe Revert "bind: Update to 9.11.14"
build fails on armv5tel: https://nightly.ipfire.org/next/2020-01-02%2016:17:54%20+0000-c846ed16/armv5tel/

This reverts commit 7d9b0ab697.
2020-01-03 21:13:30 +00:00
Matthias Fischer
7d9b0ab697 bind: Update to 9.11.14
For details see:
https://downloads.isc.org/isc/bind9/9.11.14/RELEASE-NOTES-bind-9.11.14.html

"Bug Fixes

Fixed a bug that caused named to leak memory on reconfiguration when any
GeoIP2 database was in use. [GL #1445]

Fixed several possible race conditions discovered by Thread Sanitizer."

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-12-29 19:17:45 +00:00
Matthias Fischer
78756496c9 bind: Update to 9.11.13
For details see:

https://downloads.isc.org/isc/bind9/9.11.13/RELEASE-NOTES-bind-9.11.13.html

"Security Fixes

    Set a limit on the number of concurrently served pipelined TCP queries.
    This flaw is disclosed in CVE-2019-6477. [GL #1264]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-11-30 09:57:49 +00:00
Matthias Fischer
4ba4645d12 bind: Update to 9.11.12
For details see:
https://downloads.isc.org/isc/bind9/9.11.12/RELEASE-NOTES-bind-9.11.12.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-21 19:01:32 +00:00
Matthias Fischer
5121f35be3 bind: Update to 9.11.11
For details see:
https://downloads.isc.org/isc/bind9/9.11.11/RELEASE-NOTES-bind-9.11.11.html

"Security Fixes

   A race condition could trigger an assertion failure when a large
   number of incoming packets were being rejected. This flaw is disclosed
   in CVE-2019-6471. [GL #942]

...

Bug Fixes

   Glue address records were not being returned in responses to root priming
   queries; this has been corrected. [GL #1092]

   Interaction between DNS64 and RPZ No Data rule (CNAME *.) could cause
   unexpected results; this has been fixed. [GL #1106]

   named-checkconf now checks DNS64 prefixes to ensure bits 64-71 are zero.
   [GL #1159]

   named-checkconf could crash during configuration if configured to use "geoip
   continent" ACLs with legacy GeoIP. [GL #1163]

   named-checkconf now correctly reports missing dnstap-output option when dnstap
   is set. [GL #1136]

   Handle ETIMEDOUT error on connect() with a non-blocking socket. [GL #1133]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-08 18:06:58 +00:00
Matthias Fischer
cf2aa683a9 bind: Update to 9.11.10
For details see:
https://downloads.isc.org/isc/bind9/9.11.10/RELEASE-NOTES-bind-9.11.10.html

"Security Fixes

A race condition could trigger an assertion failure when a large
number of incoming packets were being rejected.
This flaw is disclosed in CVE-2019-6471. [GL #942]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-08-28 08:16:48 +00:00
Matthias Fischer
6817d23a01 bind: Update to 9.11.9
For details see:
https://downloads.isc.org/isc/bind9/9.11.9/RELEASE-NOTES-bind-9.11.9.html

"Security Fixes

   A race condition could trigger an assertion failure when a large
   number of incoming packets were being rejected.
   This flaw is disclosed in CVE-2019-6471. [GL #942]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-08-20 17:37:26 +00:00
Matthias Fischer
f3959d13e8 bind: Update to 9.11.8
For Details see:
https://downloads.isc.org/isc/bind9/9.11.8/RELEASE-NOTES-bind-9.11.8.html

"Security Fixes
    A race condition could trigger an assertion failure when a large number
    of incoming packets were being rejected.
    This flaw is disclosed in CVE-2019-6471. [GL #942]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-21 01:39:18 +01:00
Matthias Fischer
f225f3ee29 bind: Update to 9.11.7
For details see:
http://ftp.isc.org/isc/bind9/9.11.7/RELEASE-NOTES-bind-9.11.7.html

"Security Fixes

  The TCP client quota set using the tcp-clients option could be exceeded in some cases.
  This could lead to exhaustion of file descriptors.
  This flaw is disclosed in CVE-2018-5743. [GL #615]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-24 06:36:55 +01:00
Matthias Fischer
9177b69830 bind: Update to 9.11.6-P1
For details see:
http://ftp.isc.org/isc/bind9/9.11.6-P1/RELEASE-NOTES-bind-9.11.6-P1.html

"Security Fixes

 The TCP client quota set using the tcp-clients option could be exceeded in some cases.
 This could lead to exhaustion of file descriptors. This flaw is disclosed in CVE-2018-5743.
 [GL #615]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-05-07 23:48:24 +01:00
Matthias Fischer
ae45fb5193 bind: Update to 9.11.6
For details see:
http://ftp.isc.org/isc/bind9/9.11.6/RELEASE-NOTES-bind-9.11.6.html

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-02 14:10:03 +00:00
Matthias Fischer
cab2314ac4 bind: Update to 9.11.5-P1
For details see:
http://ftp.isc.org/isc/bind9/9.11.5-P1/RELEASE-NOTES-bind-9.11.5-P1.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-18 22:29:39 +00:00
Matthias Fischer
9a12784047 BUG 11929: Build 'bind'-binaries dynamically and install needed libraries (V2)
Hi,

To save space linking the 'bind 9.11.5'-binaries was changed from statically to dynamically.

Changes to V2:
Removed unnecessary '*.so'-links.

Complete file sizes shrinked from ~4800K to ~1700K. Needs testing and confirmation!

I'm running this version right now under Core 124 - no seen problems so far.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-12-01 16:13:25 +00:00
Michael Tremer
2c405584b8 bind: Update to 9.9.5.
Enable DNSSEC.
2014-07-05 13:43:25 +02:00
Michael Tremer
a0ef4c5bb6 bind: Ship dig.
References #10151.
2013-02-07 17:06:13 +01:00
Christian Schmidt
3c6693064f Added nsupdate to bind rootfile. 2009-07-14 23:04:13 +02:00
ms
67c31465de Zwischencommit Rootfiles...
git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@335 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-11-01 17:55:25 +00:00
ms
c3db995cc9 Zwischencommit fuer LFS.
Ein Paar Rootfiles erstellt.
./make.sh prefetch nach ./make.sh downloadsrc umbenannt.


git-svn-id: http://svn.ipfire.org/svn/ipfire/trunk@326 ea5c0bd1-69bd-2848-81d8-4f18e57aeed8
2006-10-20 14:32:17 +00:00