Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 233675 - net-dns/bind <9.4.2_p2 performance issues related to port allocation
Summary: net-dns/bind <9.4.2_p2 performance issues related to port allocation
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://ftp.isc.org/isc/bind9/9.4.2-P2...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-08-02 07:24 UTC by Tobias Scherbaum (RETIRED)
Modified: 2020-04-09 19:03 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tobias Scherbaum (RETIRED) gentoo-dev 2008-08-02 07:24:03 UTC
BIND 9.4.2-P2 is now available.

This is the SECOND security patch for BIND 9.4.2, addressing
performance and stability issues in BIND 9.4.2-P1.  Key features
are as follows:

- performance improvement over the P1 releases, namely
   + significantly remedying the port allocation issues
   + allowing TCP queries and zone transfers while issuing as many
      outstanding UDP queries as possible
   + additional security of port randomization at the same level as P1

NOTE: There are some remaining stability problems in 9.4.2-P2 when
running under Microsoft Windows.  A fix has been implemented, but
missed the cutoff time for this release; it will be addressed in a
Windows-specific release very soon.


and also 9.5.0:

This is the SECOND security patch for BIND 9.5.0, addressing
performance and stability issues in BIND 9.5.0-P1.  Key features
are as follows:

- performance improvement over the P1 releases, namely
   + significantly remedying the port allocation issues
   + allowing TCP queries and zone transfers while issuing as many
      outstanding UDP queries as possible
   + additional security of port randomization at the same level as P1
- also includes fixes for several bugs in the 9.5.0 base code

NOTE: There are some remaining stability problems in 9.5.0-P2 when
running under Microsoft Windows.  A fix has been implemented, but
missed the cutoff time for this release; it will be addressed in a
Windows-specific release very soon.

Both 9.4.2_p2 and 9.5.0_p2 are inCVS, candidates for stabilization are:
=net-dns/bind-tools-9.4.2_p2
=net-dns/bind-9.4.2_p2
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-08-02 12:00:35 UTC
Arches, please test and mark stable:
=net-dns/bind-9.4.2_p2
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86"
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-08-02 12:01:02 UTC
well.. and
=net-dns/bind-tools-9.4.2_p2

as mentioned in comment #0
Comment 3 Tony Vroon (RETIRED) gentoo-dev 2008-08-02 12:21:14 UTC
+  02 Aug 2008; <chainsaw@gentoo.org> bind-9.4.2_p2.ebuild:
+  Stable AMD64 keyword for security bug #233675, tested on Opteron 2218
+  (hardened/amd64, gcc-3.4.6, glibc-2.6.1-r0, 2.6.24-hardened-r3 x86_64) and
+  Opteron 2354 (default/linux/amd64/2008.0/developer, gcc-4.3.1,
+  glibc-2.8_p20080602-r0, 2.6.27-rc1-00154-g660fc1f-dirty x86_64).

+  02 Aug 2008; <chainsaw@gentoo.org> bind-tools-9.4.2_p2.ebuild:
+  Stable AMD64 keyword for security bug #233675, tested on Opteron 2218
+  (hardened/amd64, gcc-3.4.6, glibc-2.6.1-r0, 2.6.24-hardened-r3 x86_64) and
+  Opteron 2354 (default/linux/amd64/2008.0/developer, gcc-4.3.1,
+  glibc-2.8_p20080602-r0, 2.6.27-rc1-00154-g660fc1f-dirty x86_64).
Comment 4 Jeroen Roovers (RETIRED) gentoo-dev 2008-08-02 16:46:33 UTC
Stable for HPPA.
Comment 5 Markus Rothe (RETIRED) gentoo-dev 2008-08-02 18:26:05 UTC
ppc64 stable
Comment 6 Raúl Porcel (RETIRED) gentoo-dev 2008-08-02 20:04:47 UTC
alpha/ia64/sparc/x86 stable
Comment 7 Tobias Scherbaum (RETIRED) gentoo-dev 2008-08-03 16:05:29 UTC
ppc stable and ready for glsa vote.
Comment 8 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-08-03 17:42:01 UTC
it seems to be more performance than security related... I vote NO.
Comment 9 Robert Buchholz (RETIRED) gentoo-dev 2008-08-03 18:01:21 UTC
According to upstream this issue only affects servers running at >10,000 requests per second, which would be very few installations (and they most probably monitor upstream mailings anyway), so I vote NO.
closing.