BIND 9.9.1-P3 is now available

2012-09-12 Thread Michael McNally
Introduction

   BIND 9.9.1-P3 is the latest production release of BIND 9.9.

   This document summarizes changes from BIND 9.9.0 to BIND 9.9.1-P3.
   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options.
   Free support is provided by our user community via a mailing
   list. Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents a named assert (crash) when queried for a record whose
   RDATA exceeds 65535 bytes.  [RT #30416]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized.  [RT #30025]

   ISC_QUEUE handling for recursive clients was updated to address
   a race condition that could cause a memory leak.  This rarely
   occurred with UDP clients, but could be a significant problem
   for a server handling a steady rate of TCP queries.  [RT #29539
   & #30233]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process.  [RT #29644]

New Features

   None

Feature Changes

   BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

   A note will be added to the README in future releases to explain
   that the improved scalability provided by using multiple threads
   to listen for and process queries (change 3137, RT #22992) does
   not provide any performance benefit when running BIND on versions
   of the linux kernel that do not include the 'lockless UDP transmit
   path' changes that were incorporated in 2.6.39.  (Some linux
   distributors may have provided this functionality under their
   own version numbering systems).

Bug Fixes

   Fixes the defect introduced by change #3314 that was causing
   failures when saving stub zones to disk (resulting in excessive
   CPU usage in some cases).  [RT #29952]

   The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-threaded
   environment.  (Note that this may not provide a measurable
   improvement over previous versions of BIND, but it corrects the
   performance impact of change 3309 / RT #27995) [RT #29239]

   Addresses a race condition that can cause named to to crash when
   the masters list for a zone is updated via rndc reload/reconfig
   [RT #26732]

   named-checkconf now correctly validates dns64 clients acl
   definitions. [RT #27631]

   Fixes a race condition in zone.c that can cause named to crash
   during the processing of rndc delzone [RT #29028]

   Prevents a named segfault from resolver.c due to procedure
   fctx_finddone() not being thread-safe.  [RT #27995]

   Improves DNS64 reverse zone performance. [RT #28563]

   Adds wire format lookup method to sdb. [RT #28563]

   Uses hmctx, not mctx when freeing rbtdb->heaps to avoid triggering
   an assertion when flushing cache data. [RT #28571]

   Prevents intermittent named crashes following an rndc reload [RT #28606]

   Resolves inconsistencies in locating DNSSEC keys where zone names
   contain characters that require special mappings [RT #28600]

   A new flag -R  has been added to queryperf for running tests
   using non-recursive queries.  It also now builds correctly on
   MacOS version 10.7 (darwin)  [RT #28565]

   Named no longer crashes if gssapi is enabled in named.conf but
   was not compiled into the binary [RT #28338]

   SDB now handles unexpected errors from back-end database drivers
   gracefully instead of exiting on an assert. [RT #28534]

   Prevents named crashes as a result of dereferencing a NULL pointer
   in zmgr_start_xfrin_ifquota if the zone was being removed while
   there were zone transfers still pending [RT #28419]

   Corrects a parser bug that could cause named to crash while
   reading a malformed zone file. [RT #28467]

   Ensures that when a client recurses its status fields are
   consistently set so that named doesn't fail on an INSIST in
   client.c:exit_check. [RT #28346]

   Fixed a problem preventing proper use of 64 bit time values in
   libbind. [RT # 26542]

   isccc/cc.c:table_fromwire could fail to free an allocated object
   on error, leading to a possible memory leak condition. [RT #28265]

   Fixed a build error on systems without ENOTSUP.  [RT #28200] 

   The header file isc/hmacsha.h is now installed when building
   BIND. [RT #28169]

    responses will no longer be returned in the additional
   sect

BIND 9.6-ESV-R7-P3 is now available

2012-09-12 Thread Michael McNally
Introduction

   BIND 9.6-ESV-R7-P3 is the latest production release of BIND
   9.6-ESV.

   BIND 9.6-ESV is an Extended Support Version of BIND 9.

   This document summarizes changes from BIND 9.6-ESV-R6 to BIND
   9.6-ESV-R7-P3.  Please see the CHANGES file in the source code
   release for a complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on http://www.isc.org/support
   for paid support options.  Free support is provided by our user
   community via a mailing list.  Information on all public email
   lists is available at https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents a named assert (crash) when queried for a record whose
   RDATA exceeds 65535 bytes.  [RT #30416]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized.  [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process.  [RT #29644]

New Features

   None

Feature Changes

   BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fixes

   Fixes the defect introduced by change #3314 that was causing
   failures when saving stub zones to disk (resulting in excessive
   CPU usage in some cases).  [RT #29952]

   The tests on random jitter values that are used when handling
   zone refreshes have been relaxed.  Prior to this change named
   could terminate unexpectedly when processing stub zones.  [RT#
   19821]

   The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-threaded
   environment.  (Note that this may not provide a measurable
   improvement over previous versions of BIND, but it corrects the
   performance impact of change 3309 / RT #27995) [RT #29239]

   Addresses a race condition that can cause named to to crash when
   the masters list for a zone is updated via rndc reload/reconfig
   [RT #26732]

   Fixes a race condition in zone.c that can cause named to crash
   during the processing of rndc delzone [RT #29028]

   Prevents a named segfault from resolver.c due to procedure
   fctx_finddone() not being thread-safe.  [RT #27995]

   Uses hmctx, not mctx when freeing rbtdb->heaps to avoid triggering
   an assertion when flushing cache data. [RT #28571]

   A new flag -R  has been added to queryperf for running tests
   using non-recursive queries.  It also now builds correctly on
   MacOS version 10.7 (darwin)  [RT #28565]

   Named no longer crashes if gssapi is enabled in named.conf but
   was not compiled into the binary [RT #28338]

   SDB now handles unexpected errors from back-end database drivers
   gracefully instead of exiting on an assert. [RT #28534]

Thank You

   Thank you to everyone who assisted us in making this release
   possible. If you would like to contribute to ISC to assist us
   in continuing to make quality open source software, please visit
   our donations page at http://www.isc.org/supportisc.

(c) 2001-2012 Internet Systems Consortium
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.7.6-P3 is now available

2012-09-12 Thread Michael McNally
Introduction

   BIND 9.7.6-P3 is the latest production release of BIND 9.7.

   This document summarizes changes from BIND 9.7.5 to BIND 9.7.6-P3.
   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Product support information is available on http://www.isc.org/support
   for paid support options.  Free support is provided by our user
   community via a mailing list.  Information on all public email
   lists is available at https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents a named assert (crash) when queried for a record whose
   RDATA exceeds 65535 bytes.  [RT #30416]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized.  [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process.  [RT #29644]

New Features

   None

Feature Changes

   BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fixes

   Fixes the defect introduced by change #3314 that was causing
   failures when saving stub zones to disk (resulting in excessive
   CPU usage in some cases).  [RT #29952]

   The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-threaded
   environment.  (Note that this may not provide a measurable
   improvement over previous versions of BIND, but it corrects the
   performance impact of change 3309 / RT #27995) [RT #29239]

   Addresses a race condition that can cause named to to crash when
   the masters list for a zone is updated via rndc reload/reconfig
   [RT #26732]

   Fixes a race condition in zone.c that can cause named to crash
   during the processing of rndc delzone [RT #29028]

   Prevents a named segfault from resolver.c due to procedure
   fctx_finddone() not being thread-safe.  [RT #27995]

   Uses hmctx, not mctx when freeing rbtdb->heaps to avoid triggering
   an assertion when flushing cache data. [RT #28571]

   Resolves inconsistencies in locating DNSSEC keys where zone names
   contain characters that require special mappings [RT #28600]

   A new flag -R  has been added to queryperf for running tests
   using non-recursive queries.  It also now builds correctly on
   MacOS version 10.7 (darwin)  [RT #28565]

   Named no longer crashes if gssapi is enabled in named.conf but
   was not compiled into the binary [RT #28338]

   SDB now handles unexpected errors from back-end database drivers
   gracefully instead of exiting on an assert. [RT #28534]

Thank You

   Thank you to everyone who assisted us in making this release
   possible. If you would like to contribute to ISC to assist us
   in continuing to make quality open source software, please visit
   our donations page at http://www.isc.org/supportisc.

(c) 2001-2012 Internet Systems Consortium
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


BIND 9.8.3-P3 is now available

2012-09-12 Thread Michael McNally
Introduction

   BIND 9.8.3-P3 is the latest production release of BIND 9.8.

   This document summarizes changes from BIND 9.8.2 to BIND 9.8.3-P3.
   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/all. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.


Support

   Product support information is available on http://www.isc.org/support
   for paid support options. Free support is provided by our user
   community via a mailing list.  Information on all public email
   lists is available at https://lists.isc.org/mailman/listinfo.

Security Fixes

   Prevents a named assert (crash) when queried for a record whose
   RDATA exceeds 65535 bytes.  [RT #30416]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized.  [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process.  [RT #29644]

New Features

   None

Feature Changes

   BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fixes

   Fixes the defect introduced by change #3314 that was causing
   failures when saving stub zones to disk (resulting in excessive
   CPU usage in some cases).  [RT #29952]

   The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-threaded
   environment.  (Note that this may not provide a measurable
   improvement over previous versions of BIND, but it corrects the
   performance impact of change 3309 / RT #27995) [RT #29239]

   Addresses a race condition that can cause named to to crash when
   the masters list for a zone is updated via rndc reload/reconfig
   [RT #26732]

   named-checkconf now correctly validates dns64 clients acl
   definitions. [RT #27631]

   Fixes a race condition in zone.c that can cause named to crash
   during the processing of rndc delzone [RT #29028]

   Prevents a named segfault from resolver.c due to procedure
   fctx_finddone() not being thread-safe.  [RT #27995]

   Improves DNS64 reverse zone performance. [RT #28563]

   Adds wire format lookup method to sdb. [RT #28563]

   Uses hmctx, not mctx when freeing rbtdb->heaps to avoid triggering
   an assertion when flushing cache data. [RT #28571]

   Resolves inconsistencies in locating DNSSEC keys where zone names
   contain characters that require special mappings [RT #28600]

   A new flag -R  has been added to queryperf for running tests
   using non-recursive queries.  It also now builds correctly on
   MacOS version 10.7 (darwin)  [RT #28565]

   Named no longer crashes if gssapi is enabled in named.conf but
   was not compiled into the binary [RT #28338]

   SDB now handles unexpected errors from back-end database drivers
   gracefully instead of exiting on an assert. [RT #28534]

Thank You

   Thank you to everyone who assisted us in making this release
   possible.  If you would like to contribute to ISC to assist us
   in continuing to make quality open source software, please visit
   our donations page at http://www.isc.org/supportisc.

(c) 2001-2012 Internet Systems Consortium
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


ISC Security Advisory: A Specially Crafted Resource Record Could Cause named to Terminate

2012-09-12 Thread Michael McNally
Note:

  This email advisory is provided for your information. The most
  up to date advisory information will always be at:
  https://kb.isc.org/article/AA-00778 please use this URL for the
  most up to date advisory information.

---

CVE-2012-4244: A specially crafted Resource Record could cause named
   to terminate

A nameserver can be caused to exit with a REQUIRE exception if it
can be induced to load a specially crafted resource record.

CVE: CVE-2012-4244
Document Version:  2.0
Posting date: 12 September 2012
Program Impacted: BIND
Versions affected:
   9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2,
   9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2
Severity: Critical
Exploitable: Remotely

Description:

   If a record with RDATA in excess of 65535 bytes is loaded into
   a nameserver, a subsequent query for that record will cause named
   to exit with an assertion failure.

   Please Note: Versions of BIND 9.4 and 9.5 are also affected, but
   these branches are beyond their "end of life" (EOL) and no longer
   receive testing or security fixes from ISC. For current information
   on which versions are actively supported, please see
   http://www.isc.org/software/bind/versions.

Impact:

   This vulnerability can be exploited remotely against recursive
   servers by inducing them to query for records provided by an
   authoritative server. It affects authoritative servers if a zone
   containing this type of resource record is loaded from file or
   provided via zone transfer.

CVSS Score:  7.8

CVSS Equation:  (AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and
to obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)

Workarounds:  None are known at this time.

Active exploits:  No known active exploits.

Solution: 

   Upgrade to the patched version or new release most closely related
   to your current version of BIND.

   The patched versions (-P3) of BIND can be downloaded from
   http://www.isc.org/downloads/all.  The new release versions will
   be available within the next week.

   BIND 9 version 9.7.7, 9.7.6-P3
   BIND 9 version 9.6-ESV-R8, 9.6-ESV-R7-P3
   BIND 9 version 9.8.4, 9.8.3-P3
   BIND 9 version 9.9.2, 9.9.1-P3


Document Revision History:

   1.0 - 4 Sept., 2012  Advance Notification to Phase 1
   1.1 - 6 Sept. 2012 Corrected error in Description (65535 bytes)
   1.2 - 11 Sept. 2012 Phase 2 & 3 notified
   2.0 - 12 Sept. 2012 Phase 4 - Public Released

Related Documents:

   See our BIND Security Matrix for a complete listing of Security
   Vulnerabilities and versions affected.

   If you'd like more information on our Forum or product support
   please visit www.isc.org/software/guild or www.isc.org/support.

Do you still have questions?  Questions regarding this advisory
should go to security-offi...@isc.org

Note: ISC patches only currently supported versions. When possible
we indicate EOL versions affected.

ISC Security Vulnerability Disclosure Policy:  Details of our current
security advisory policy and practice can be found here:
https://www.isc.org/security-vulnerability-disclosure-policy

The Knowledge Base article https://kb.isc.org/article/AA-00778 is
the complete and official security advisory document.  There is
also a summary article located on our website and linking to here:
https://www.isc.org/software/bind/advisories/cve-2012-4244

Legal Disclaimer: 

   Internet Systems Consortium (ISC) is providing this notice on
   an "AS IS" basis. No warranty or guarantee of any kind is expressed
   in this notice and none should be implied. ISC expressly excludes
   and disclaims any warranties regarding this notice or materials
   referred to in this notice, including, without limitation, any
   implied warranty of merchantability, fitness for a particular
   purpose, absence of hidden defects, or of non-infringement. Your
   use or reliance on this notice or materials referred to in this
   notice is at your own risk. ISC may change this notice at any
   time.  A stand-alone copy or paraphrase of the text of this
   document that omits the document URL is an uncontrolled copy.
   Uncontrolled copies may lack important information, be out of
   date, or contain factual errors.

(c) 2001-2012 Internet Systems Consortium
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users