Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 810859 - net-dns/bind-9.16.20 version bump
Summary: net-dns/bind-9.16.20 version bump
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Mikle Kolyada (RETIRED)
URL: https://downloads.isc.org/isc/bind9/9...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-08-29 02:00 UTC by Krzysztof Olędzki
Modified: 2021-10-15 04:03 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Krzysztof Olędzki 2021-08-29 02:00:21 UTC
Note - despite the changelog mentiones CVE-2021-25218, I think in only affects 9.16.19 & 9.17.16 which I don't believe were in Gentoo, so no security impact.


Notes for BIND 9.16.20
Security Fixes

    Fixed an assertion failure that occurred in named when it attempted to send a UDP packet that exceeded the MTU size, if Response Rate Limiting (RRL) was enabled. (CVE-2021-25218) [GL #2856]

    named failed to check the opcode of responses when performing zone refreshes, stub zone updates, and UPDATE forwarding. This could lead to an assertion failure under certain conditions and has been addressed by rejecting responses whose opcode does not match the expected value. [GL #2762]

Feature Changes

    Testing revealed that setting the thread affinity for various types of named threads led to inconsistent recursive performance, as sometimes multiple sets of threads competed over a single resource.

    Due to the above, named no longer sets thread affinity. This causes a slight dip of around 5% in authoritative performance, but recursive performance is now consistently improved. [GL #2822]

    CDS and CDNSKEY records can now be published in a zone without the requirement that they exactly match an existing DNSKEY record, as long as the zone is signed with an algorithm represented in the CDS or CDNSKEY record. This allows a clean rollover from one DNS provider to another when using a multiple-signer DNSSEC configuration. [GL #2710]

Bug Fixes

    Authentication of rndc messages could fail if a controls statement was configured with multiple key algorithms for the same listener. This has been fixed. [GL #2756]

Notes for BIND 9.16.19
New Features

    Using a new configuration option, parental-agents, each zone can now be associated with a list of servers that can be used to check the DS RRset in the parent zone. This enables automatic KSK rollovers. [GL #1126]

Feature Changes

    IP fragmentation has been disabled for outgoing UDP sockets. Errors triggered by sending DNS messages larger than the specified path MTU are properly handled by sending empty DNS replies with the TC (TrunCated) bit set, which forces DNS clients to fall back to TCP. [GL #2790]

Bug Fixes

    The code managing RFC 5011 trust anchors created an invalid placeholder keydata record upon a refresh failure, which prevented the database of managed keys from subsequently being read back. This has been fixed. [GL #2686]

    Signed, insecure delegation responses prepared by named either lacked the necessary NSEC records or contained duplicate NSEC records when both wildcard expansion and CNAME chaining were required to prepare the response. This has been fixed. [GL #2759]

    If nsupdate sends an SOA request and receives a REFUSED response, it now fails over to the next available server. [GL #2758]

    A bug that caused the NSEC3 salt to be changed on every restart for zones using KASP has been fixed. [GL #2725]

    The configuration-checking code failed to account for the inheritance rules of the dnssec-policy option. This has been fixed. [GL #2780]

    The fix for [GL #1875] inadvertently introduced a deadlock: when locking key files for reading and writing, the in-view logic was not considered. This has been fixed. [GL #2783]

    A race condition could occur where two threads were competing for the same set of key file locks, leading to a deadlock. This has been fixed. [GL #2786]
Comment 1 Krzysztof Olędzki 2021-10-15 03:58:35 UTC
With 9.16.21 bump done a month ago [1] I think we can close this bug?

[1] https://gitweb.gentoo.org/repo/gentoo.git/commit/net-dns/bind?id=9e3a302ee5214041304e34e17af55042b69ce023
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-10-15 04:03:06 UTC
(In reply to Krzysztof Olędzki from comment #1)
> With 9.16.21 bump done a month ago [1] I think we can close this bug?
> 
> [1]
> https://gitweb.gentoo.org/repo/gentoo.git/commit/net-dns/
> bind?id=9e3a302ee5214041304e34e17af55042b69ce023

Thanks!