BIND 9.9.8-P4 is now available

Michael McNally mcnally at isc.org
Wed Mar 9 21:07:20 UTC 2016


Introduction

   This document summarizes changes since BIND 9.9.8:

   BIND 9.9.8-P4 addresses the security issues described in CVE-2016-1285
   and CVE-2016-1286.

   BIND 9.9.8-P3 addresses the security issue described in CVE-2015-8704.
   It also fixes a serious regression in authoritative server selection
   that was introduced in 9.9.8.

   BIND 9.9.8-P2 addresses security issues described in CVE-2015-3193
   (OpenSSL), CVE-2015-8000 and CVE-2015-8461.

   BIND 9.9.8-P1 was incomplete and was withdrawn prior to publication.

Download

   The latest versions of BIND 9 software can always be found at
   http://www.isc.org/downloads/. There you will find additional
   information about each release, source code, and pre-compiled versions
   for Microsoft Windows operating systems.

Security Fixes

     * The resolver could abort with an assertion failure due to improper
       DNAME handling when parsing fetch reply messages. This flaw is
       disclosed in CVE-2016-1286. [RT #41753]
     * Malformed control messages can trigger assertions in named and
       rndc. This flaw is disclosed in CVE-2016-1285. [RT #41666]
     * Specific APL data could trigger an INSIST. This flaw is disclosed
       in CVE-2015-8704. [RT #41396]
     * Named is potentially vulnerable to the OpenSSL vulnerability
       described in CVE-2015-3193.
     * Incorrect reference counting could result in an INSIST failure if a
       socket error occurred while performing a lookup. This flaw is
       disclosed in CVE-2015-8461. [RT#40945]
     * Insufficient testing when parsing a message allowed records with an
       incorrect class to be be accepted, triggering a REQUIRE failure
       when those records were subsequently cached. This flaw is disclosed
       in CVE-2015-8000. [RT #40987]

New Features

     * None

Feature Changes

     * Updated the compiled in addresses for H.ROOT-SERVERS.NET.

Bug Fixes

     * Authoritative servers that were marked as bogus (e.g. blackholed in
       configuration or with invalid addresses) were being queried anyway.
       [RT #41321]

End of Life

   The BIND 9.9 (Extended Support Version) will be supported until
   December, 2017. https://www.isc.org/downloads/software-support-policy/

Thank You

   Thank you to everyone who assisted us in making this release possible.
   If you would like to contribute to ISC to assist us in continuing to
   make quality open source software, please visit our donations page at
   http://www.isc.org/donate/.


More information about the bind-announce mailing list