Go to file
Dominique Leuenberger 7384013025 Accepting request 1060984 from network
- Update to release 9.18.11
  Security Fixes:
  * An UPDATE message flood could cause named to exhaust all
    available memory. This flaw was addressed by adding a new
    update-quota option that controls the maximum number of
    outstanding DNS UPDATE messages that named can hold in a queue
    at any given time (default: 100). (CVE-2022-3094)
  * named could crash with an assertion failure when an RRSIG query
    was received and stale-answer-client-timeout was set to a
    non-zero value. This has been fixed. (CVE-2022-3736)
  * named running as a resolver with the
    stale-answer-client-timeout option set to any value greater
    than 0 could crash with an assertion failure, when the
    recursive-clients soft quota was reached. This has been fixed.
    (CVE-2022-3924)
  New Features:
  * The new update-quota option can be used to control the number
    of simultaneous DNS UPDATE messages that can be processed to
    update an authoritative zone on a primary server, or forwarded
    to the primary server by a secondary server. The default is
    100. A new statistics counter has also been added to record
    events when this quota is exceeded, and the version numbers for
    the XML and JSON statistics schemas have been updated.
  Removed Features:
  * The Differentiated Services Code Point (DSCP) feature in BIND
    has been non-operational since the new Network Manager was
    introduced in BIND 9.16. It is now marked as obsolete, and
    vestigial code implementing it has been removed. Configuring
    DSCP values in named.conf now causes a warning to be logged.
  Feature Changes:
  * The catalog zone implementation has been optimized to work with
    hundreds of thousands of member zones.
  Bug Fixes:
  * A rare assertion failure was fixed in outgoing TCP DNS
    connection handling.
  * Large zone transfers over TLS (XoT) could fail. This has been
    fixed.
  * In addition to a previously fixed bug, another similar issue
    was discovered where quotas could be erroneously reached for
    servers, including any configured forwarders, resulting in
    SERVFAIL answers being sent to clients. This has been fixed.
  * In certain query resolution scenarios (e.g. when following
    CNAME records), named configured to answer from stale cache
    could return a SERVFAIL response despite a usable, non-stale
    answer being present in the cache. This has been fixed.
  * When an outgoing request timed out, named would retry up to
    three times with the same server instead of trying the next
    available name server. This has been fixed.
  * Recently used ADB names and ADB entries (IP addresses) could
    get cleaned when ADB was under memory pressure. To mitigate
    this, only actual ADB names and ADB entries are now counted
    (excluding internal memory structures used for “housekeeping”)
    and recently used (<= 10 seconds) ADB names and entries are
    excluded from the overmem memory cleaner.
  * The “Prohibited” Extended DNS Error was inadvertently set in
    some NOERROR responses. This has been fixed.
  * Previously, TLS session resumption could have led to handshake
    failures when client certificates were used for authentication
    (Mutual TLS). This has been fixed.
  [bsc#1207471, bsc#1207473, bsc#1207475]

OBS-URL: https://build.opensuse.org/request/show/1060984
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=191
2023-01-26 12:57:06 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=1 2006-12-18 23:15:14 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=1 2006-12-18 23:15:14 +00:00
bind-9.18.11.tar.xz Updating link to change in openSUSE:Factory/bind revision 191 2023-01-26 12:57:06 +00:00
bind-9.18.11.tar.xz.sha512.asc Updating link to change in openSUSE:Factory/bind revision 191 2023-01-26 12:57:06 +00:00
bind-ldapdump-use-valid-host.patch Accepting request 1008578 from home:mcepl:branches:network 2022-10-06 23:52:09 +00:00
bind.changes Updating link to change in openSUSE:Factory/bind revision 191 2023-01-26 12:57:06 +00:00
bind.conf Accepting request 992780 from home:jcronenberg:branches:network 2022-08-04 14:25:35 +00:00
bind.keyring Accepting request 449784 from home:simotek:branches:network 2017-01-12 12:21:22 +00:00
bind.spec Updating link to change in openSUSE:Factory/bind revision 191 2023-01-26 12:57:06 +00:00
dlz-schema.txt Updating link to change in openSUSE:Factory/bind revision 45.0 2010-04-13 19:20:44 +00:00
dnszone-schema.txt Accepting request 614550 from home:nkukreja:branches:network 2018-06-07 06:48:37 +00:00
named.conf Accepting request 787151 from home:kukuk:container 2020-03-23 07:34:53 +00:00
named.root Accepting request 909186 from home:polslinux:branches:network 2021-07-29 13:39:41 +00:00
vendor-files.tar.bz2 Accepting request 1055962 from home:thiagomacieira:branches:network 2023-01-05 13:49:53 +00:00