Commit Graph

15 Commits

Author SHA1 Message Date
breakings
35bd7e01da
bind: bump to 9.18.7 (#555)
* bind: update to version 9.18.4

Fixes:
- CVE-2022-1183

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>

* bind: bump to 9.18.7

Fixes multiple security issues:

CVE-2022-38178 - Fix memory leak in EdDSA verify processing

CVE-2022-3080 - Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query

CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
			and later versions. The openssldh_compare(),
			openssldh_paramcompare(), and openssldh_todns()
			functions were affected

CVE-2022-2881 - When an HTTP connection was reused to get
			statistics from the stats channel, and zlib
			compression was in use, each successive
			response sent larger and larger blocks of memory,
			potentially reading past the end of the allocated
			buffer

CVE-2022-2795 - Prevent excessive resource use while processing large
			delegations

Signed-off-by: Noah Meyerhans <frodo@morgul.net>

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
Co-authored-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
Co-authored-by: Noah Meyerhans <frodo@morgul.net>
2022-10-06 21:39:50 +08:00
Philip Prindeville
ee3891f873 bind: add subpackaging for ddns-confgen
ddns-confgen is a useful tool for generating partial zones for
transfer/update in dynamic DNS (ddns) scenarios.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-25 03:43:23 +00:00
Noah Meyerhans
3e298700fc bind: bump to 9.18.1
Fixes multiple security issues:

 * CVE-2022-0667 -- An assertion could occur in resume_dslookup() if the
                    fetch had been shut down earlier
 * CVE-2022-0635 -- Lookups involving a DNAME could trigger an INSIST when
                    "synth-from-dnssec" was enabled
 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
                    isc__nm_process_sock_buffer() to be called recursively,
                    which in turn left TCP connections hanging in the CLOSE_WAIT
                    state blocking indefinitely when out-of-order processing was
                    disabled.
 * CVE-2021-25220 -- The rules for acceptance of records into the cache
                     have been tightened to prevent the possibility of
                     poisoning if forwarders send records outside the
                     configured bailiwick

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-03-18 11:39:59 +00:00
Philip Prindeville
a2c812d817 bind: fix warnings about unknown options
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-18 11:39:47 +00:00
Philip Prindeville
2a8055d2ba named: don't leak mktemp files on reload
Unless we're using "mktemp -u ..." (not recommended), it will
create the temp file as part of its safety checking.  Thus you
should only create the name (file) if you're going to use it,
and always remove it if you have created it.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-18 11:39:38 +00:00
Noah Meyerhans
dbb05fd4cf bind: support compile-time exclusion of DNS-over-HTTPS support
DoH is enabled by default, but disabling it removes the need to link
against libnghttp2, which may be desirable more constrained
environments.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-08 10:23:26 +00:00
Noah Meyerhans
bee5f05a4e bind: bump to 9.18.0
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-01 19:21:58 +00:00
Noah Meyerhans
812cc478a0 bind: bump to 9.17.20
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-01 19:21:50 +00:00
Philip Prindeville
9ed5c9bab4 bind: created /var/run/named directory
Side-effect of dropping capabilities(7) with last commit is now we
need the `/var/run/named/` directory created for us at startup.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:40 +00:00
Philip Prindeville
b299b7ee67 bind: Bump to 9.17.19
The following CVE updates are included:

* CVE-2021-25219: The "lame-ttl" option is now forcibly set to 0. This
  effectively disables the lame server cache, as it could previously be
  abused by an attacker to significantly degrade resolver performance.

* CVE-2021-25218: An assertion failure occurred when named attempted
  to send a UDP packet that exceeded the MTU size, if Response Rate
  Limiting (RRL) was enabled.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:31 +00:00
Philip Prindeville
96cf1b9e6e bind: detect new interfaces when they come up
Reload the service when interfaces flap; note that libcap support
is required to open new sockets on interfaces coming up during
a reload, otherwise a full restart would be needed.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:22 +00:00
Philip Prindeville
2697a62a6d bind: deprecate managed-keys
This has been replaced with the "trust-anchors" keyword, per
section 8.21.1 New Features of the Bind 9 Administrator Reference
Manual:

• In order to clarify the configuration of DNSSEC keys, the trusted-keys and managed-keys statements have been deprecated, and the new trust-anchors statement should now be used for both types of key.
  When used with the keyword initial-key, trust-anchors has the same behavior as managed-keys, i.e., it configures a trust anchor that is to be maintained via RFC 5011.
  When used with the new keyword static-key, trust-anchors has the same behavior as trusted-keys, i.e., it configures a permanent trust anchor that will not automatically be updated. (This usage is not recommended for the root key.) [GL #6]

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-02-01 19:21:10 +00:00
lean
49b7495639 packages: merge upstream 2021-06-15 17:47:11 +08:00
coolsnowwolf
c36ad692b4 packages: sync to new packages 2020-07-08 14:18:52 +08:00
coolsnowwolf
d17588da1a first commit 2018-10-18 16:56:47 +08:00