Commit Graph

1125 Commits

Author SHA1 Message Date
Thomas Woerner
66e919931d - Fix upgrade of doc sub package to remove links replaced by directories
(RHEL-48798)

  Resolves: RHEL-48798
2025-02-13 17:02:36 +01:00
Petr Menšík
95523016c1 Updates to nsupdate TLS backport fixing memory
Properly release memory when TLS is used.

Resolves: RHEL-77354
2025-02-11 12:50:46 +01:00
Petr Menšík
8c9ca2f8f6 Include a test for nsupdate changes
Resolves: RHEL-77354
2025-02-11 12:50:46 +01:00
Petr Menšík
e56ef46872 Backport nsupdate TLS support
This should add working nsupdate support for -S parameter and some
others in addition.

References:
https://issues.redhat.com/browse/FREEIPA-11706
https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/6751
https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/6752

Resolves: RHEL-77354
2025-02-11 12:50:46 +01:00
Petr Menšík
3acbaf0f31 Permanently remove DLZ parts build
Related: RHEL-48798
2025-02-10 21:05:23 +01:00
Petr Menšík
b0ffcd1388 Make documentation links relative
Do not require absolute paths, but use relative links even to
non-existent buildroot subdirectory. It should compute it correctly.

Related: RHEL-48798
2025-02-10 20:51:22 +01:00
Petr Menšík
058af8fc38 Do not add each release to gitignore
Related: RHEL-48798
2025-02-10 20:47:08 +01:00
Petr Menšík
088763fa3f Update to 9.16.33 (rhbz#2342784)
Security Fixes:

- DNS-over-HTTPS flooding fixes. (CVE-2024-12705)
- Limit additional section processing for large RDATA sets. (CVE-2024-11187)

New Features:

- Add a new option to configure the maximum number of outgoing queries per client request.

Bug Fixes:

- Fix nsupdate hang when processing a large update.
- Fix possible assertion failure when reloading server while processing update policy rules. [GL #5006]
- Fix dnssec-signzone signing non-DNSKEY RRsets with revoked keys.
- Fix improper handling of unknown directives in resolv.conf.

https://downloads.isc.org/isc/bind9/9.18.33/doc/arm/html/notes.html#notes-for-bind-9-18-33

Resolves: RHEL-48798
2025-02-10 20:47:08 +01:00
Petr Menšík
efb20ad8e7 Add sysusers named user creation (rhbz#2105415)
Drop original user creating in favor of sysusers file definition.

(cherry picked from commit 071ec07d27989a8d548834292fa46ca2312b4862)

Related: RHEL-48798
2025-02-10 20:47:08 +01:00
Petr Menšík
491ec650e2 Update to 9.18.32 (rhbz#2331675)
- Remove CHANGES file from package

Removed Features:

- Disable DLZ plugins, they are not shipped with bind anymore

New Features:

- new 2024 KSK root key

Feature Changes:

- max-records-per-type and max-types-per-name improved logging when
  reached over their value

And NSEC3 and two dig bug fixes.

https://downloads.isc.org/isc/bind9/9.18.32/doc/arm/html/notes.html#notes-for-bind-9-18-32

Resolves: RHEL-48798
2025-02-10 20:47:05 +01:00
Petr Menšík
d0eb0f5c06 Update to 9.18.29
- Tighten max-recursion-queries and add max-query-restarts configuration statement.
- Raise the log level of priming failures.
- Bug fixes

https://downloads.isc.org/isc/bind9/9.18.29/doc/arm/html/notes.html#notes-for-bind-9-18-29

Resolves: RHEL-48798
2025-02-10 20:29:03 +01:00
Petr Menšík
ace5c32a9c Update to 9.18.28
Security Fixes

-   A malicious DNS client that sent many queries over TCP but never read the responses could cause a server to respond slowly or not at all for other clients. This has been fixed. (CVE-2024-0760) [GL #4481]

-   It is possible to craft excessively large resource records sets, which have the effect of slowing down database processing. This has been addressed by adding a configurable limit to the number of records that can be stored per name and type in a cache or zone database. The default is 100, which can be tuned with the new max-records-per-type option. [GL #497] [GL #3405]

    It is possible to craft excessively large numbers of resource record types for a given owner name, which has the effect of slowing down database processing. This has been addressed by adding a configurable limit to the number of records that can be stored per name and type in a cache or zone database. The default is 100, which can be tuned with the new max-types-per-name option. (CVE-2024-1737) [GL #3403]

    ISC would like to thank Toshifumi Sakaguchi who independently discovered and responsibly reported the issue to ISC. [GL #4548]

-   Validating DNS messages signed using the SIG(0) protocol (RFC 2931) could cause excessive CPU load, leading to a denial-of-service condition. Support for SIG(0) message validation was removed from this version of named. (CVE-2024-1975) [GL #4480]

-   Due to a logic error, lookups that triggered serving stale data and required lookups in local authoritative zone data could have resulted in an assertion failure. This has been fixed. (CVE-2024-4076) [GL #4507]

    Potential data races were found in our DoH implementation, related to HTTP/2 session object management and endpoints set object management after reconfiguration. These issues have been fixed. [GL #4473]

    ISC would like to thank Dzintars and Ivo from nic.lv for bringing this to our attention.

    When looking up the NS records of parent zones as part of looking up DS records, it was possible for named to trigger an assertion failure if serve-stale was enabled. This has been fixed. [GL #4661]

And bugfixes.

https://downloads.isc.org/isc/bind9/9.18.28/doc/arm/html/notes.html

Resolves: RHEL-48798
2025-02-10 20:27:46 +01:00
Petr Menšík
cbe3d776c7 Do not obsolete previous version by upname_compat
If obsoleting is needed, it needs to be tailored for explicit
subpackages.

Related: RHEL-48798
2025-02-10 19:52:36 +01:00
Petr Menšík
32176bd5fe Update to 9.18.27
New Features

- A new option signatures-jitter has been added to dnssec-policy to allow
  signature expirations to be spread out over a period of time. [GL #4554]

Feature Changes

- DNSSEC signatures that are not valid because the current time falls
  outside the signature inception and expiration dates are skipped
  instead of causing an immediate validation failure. [GL #4586]

https://downloads.isc.org/isc/bind9/9.18.27/doc/arm/html/notes.html#notes-for-bind-9-18-27

Fixes security issues reported in:

https://downloads.isc.org/isc/bind9/9.18.24/doc/arm/html/notes.html#security-fixes

- Validating DNS messages containing a lot of DNSSEC signatures could cause excessive CPU
  load, leading to a denial-of-service condition. This has been fixed. (CVE-2023-50387)

ISC would like to thank Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner
from the German National Research Center for Applied Cybersecurity ATHENE for bringing
this vulnerability to our attention. [GL #4424]

Preparing an NSEC3 closest encloser proof could cause excessive CPU load, leading to
a denial-of-service condition. This has been fixed. (CVE-2023-50868) [GL #4459]

Parsing DNS messages with many different names could cause excessive CPU load.
This has been fixed. (CVE-2023-4408)

ISC would like to thank Shoham Danino from Reichman University, Anat Bremler-Barr
from Tel-Aviv University, Yehuda Afek from Tel-Aviv University, and Yuval Shavitt
from Tel-Aviv University for bringing this vulnerability to our attention. [GL #4234]

Specific queries could cause named to crash with an assertion failure when
nxdomain-redirect was enabled. This has been fixed. (CVE-2023-5517) [GL #4281]

A bad interaction between DNS64 and serve-stale could cause named to crash with
an assertion failure, when both of these features were enabled. This has been fixed.
(CVE-2023-5679) [GL #4334]

Under certain circumstances, the DNS-over-TLS client code incorrectly attempted to
process more than one DNS message at a time, which could cause named to crash with
an assertion failure. This has been fixed. [GL #4487]

Increased release to be higher than c9s bind9.18 component.

; Resolves: CVE-2023-4408 CVE-2023-50387 CVE-2023-50868 CVE-2023-5517 CVE-2023-5679
Resolves: RHEL-48798
2025-02-10 19:52:33 +01:00
Petr Menšík
6b816d15f5 Include dependency on python3-dns from SYSTEMTEST suite
Related: RHEL-48798
2025-02-10 19:50:56 +01:00
Troy Dawson
c585ccf4f1 Bump release for October 2024 mass rebuild:
Resolves: RHEL-64018
2024-10-29 08:16:35 -07:00
Petr Menšík
af0e739346 Make OpenSSL engine support optional and disabled
openssl-devel-engine is now needed on rawhide to have engine header
present. Make it enabled by default, but possible to disable built
support for it easy way.

https://fedoraproject.org/wiki/Changes/OpensslDeprecateEngine

Resolves: RHEL-22408
2024-10-08 20:14:11 +02:00
Troy Dawson
1999defc02 Bump release for June 2024 mass rebuild 2024-06-24 08:37:08 -07:00
psklenar@redhat.com
5b9483bf95 c10s: fmf plans and gatying for RHEL CI 2024-05-28 10:19:14 +02:00
Fedora Release Engineering
59820e13a5 Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild 2024-01-23 00:22:04 +00:00
Fedora Release Engineering
5e93e0b078 Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild 2024-01-19 14:23:22 +00:00
Petr Menšík
9899e74f4d Update changed b.root-servers.net address in hints (#2253460) 2024-01-16 11:14:58 +01:00
Petr Menšík
7a039e1831 Revert Skip failing test on i686 (#2240253)
Selective revert removing the patch, but keeping changelog.
2024-01-15 16:55:15 +01:00
Petr Menšík
db9d0ed8b6 Update to 9.18.21
https://downloads.isc.org/isc/bind9/9.18.21/doc/arm/html/notes.html#notes-for-bind-9-18-21

Removed Features

- Support for using AES as the DNS COOKIE algorithm (cookie-algorithm aes;) has been deprecated and will be removed in a future release. Please use the current default, SipHash-2-4, instead. [GL #4421]

- The resolver-nonbackoff-tries and resolver-retry-interval statements have been deprecated. Using them now causes a warning to be logged. [GL #4405]
2024-01-15 16:51:36 +01:00
Petr Menšík
00135d6b20 Update to 9.18.20 (#2249835)
- B.ROOT-SERVERS.NET address update
- lock-file fixes

https://downloads.isc.org/isc/bind9/9.18.20/doc/arm/html/notes.html#notes-for-bind-9-18-20
2023-11-16 15:58:46 +01:00
Petr Menšík
d03e0852a9 Update to 9.18.19 (#2232346)
https://downloads.isc.org/isc/bind9/9.18.19/doc/arm/html/notes.html#notes-for-bind-9-18-19

Resolves: CVE-2023-3341 CVE-2023-4236
2023-09-25 14:41:38 +02:00
Petr Menšík
286970af6a Skip failing test on i686 (#2240253) 2023-09-22 20:43:56 +02:00
Petr Menšík
782e6f0ca5 Update to 9.18.18 (#2232346)
https://downloads.isc.org/isc/bind9/9.18.18/doc/arm/html/notes.html#notes-for-bind-9-18-18
2023-09-06 20:06:06 +02:00
Petr Menšík
bd877cd86b Add preparation for multi-component shared tests
Define explicit component for testing run from this component.
Alternative component in fedora is bind9-next
2023-08-25 13:21:19 +02:00
Petr Menšík
fc196eb713 Update to 9.18.17 (#2223913)
https://downloads.isc.org/isc/bind9/9.18.17/doc/arm/html/notes.html#notes-for-bind-9-18-17
2023-07-19 23:47:02 +02:00
Fedora Release Engineering
3deb8ee245 Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2023-07-19 14:36:49 +00:00
Petr Menšík
7ee174a831 Update to 9.18.16 (#2216462)
https://downloads.isc.org/isc/bind9/9.18.16/doc/arm/html/notes.html#notes-for-bind-9-18-16

Resolves: CVE-2023-2828 CVE-2023-2911
2023-06-22 00:34:42 +02:00
Petr Menšík
9678d7855f Update to 9.18.15 (#2207908) 2023-05-17 18:59:49 +02:00
Petr Menšík
15dc7fb16a Update to 9.18.14 (#2187996)
https://downloads.isc.org/isc/bind9/9.18.14/doc/arm/html/notes.html#notes-for-bind-9-18-14
2023-04-21 22:18:36 +02:00
Petr Menšík
03b1f0a4e4 Enumerate all SPDX licenses used 2023-04-05 14:34:25 +02:00
Petr Menšík
13b1bcc0f0 Update to 9.18.3 (#2178717)
https://downloads.isc.org/isc/bind9/9.18.13/doc/arm/html/notes.html#notes-for-bind-9-18-13
2023-03-22 17:57:33 +01:00
Petr Menšík
e853970bcf Remove component from test plans again 2023-03-07 15:26:38 +01:00
Petr Menšík
10cb7fcdc5 Update to 9.18.12 (#2170096)
https://downloads.isc.org/isc/bind9/9.18.12/doc/arm/html/notes.html#notes-for-bind-9-18-12
2023-02-16 02:43:32 +01:00
Petr Menšík
9303298043 Parametrize tests for this component 2023-01-30 17:31:14 +01:00
Petr Menšík
6db5408538 Update to 9.18.11 (#2164395)
Resolves: CVE-2022-3094 CVE-2022-3736 CVE-2022-3924

https://downloads.isc.org/isc/bind9/9.18.11/doc/arm/html/notes.html#notes-for-bind-9-18-11
2023-01-27 17:25:00 +01:00
Fedora Release Engineering
e1fa37e19c Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2023-01-18 22:52:41 +00:00
Petr Menšík
ced3b36a51 Ensure isc_rwlocktype_t is defined always
Prevent issues in compilation after dns/zt.h change.
2023-01-16 21:58:07 +01:00
Petr Menšík
9b329d0dd6 Update to 9.18.10 (#2143258)
https://downloads.isc.org/isc/bind9/9.18.10/doc/arm/html/notes.html#notes-for-bind-9-18-10
2023-01-16 14:32:06 +01:00
Petr Menšík
5e42931b09 Update to 9.18.9 (#2143258)
https://downloads.isc.org/isc/bind9/9.18.9/doc/arm/html/notes.html#notes-for-bind-9-18-9
2022-11-21 12:39:51 +01:00
Petr Menšík
21fe71bc46 Start using DEFAULT_HMAC configured variable
Do not replace hmac-md5 with fixed algorithm. But use default variable
used by more recent versions.
2022-10-23 00:13:43 +02:00
Petr Menšík
99fd53a106 Update to 9.18.8 (#2136100)
https://downloads.isc.org/isc/bind9/9.18.8/doc/arm/html/notes.html#notes-for-bind-9-18-8
2022-10-22 22:07:38 +02:00
Petr Menšík
e6424d1a09 Enable automatic restart on crashes
named contains high number of assertions checking expected state of the
daemon. That is part of defensive code style to prevent many attacks.
The most common failure is failing some assertion check in rare
circumstances. Even when this should not happen, try keeping the service
running. If such failed assertion produces coredump just from time to
time, avoid failing hard the whole service. coredumpctl will keep track
of all crashes anyway.
2022-09-30 12:58:12 +02:00
Petr Menšík
dc511b8cc3 Update License to SPDX identifier 2022-09-30 12:58:12 +02:00
Petr Menšík
5b047433e1 Build ARM documentation also with older sphinx on RHEL9 2022-09-30 12:58:10 +02:00
Petr Menšík
bbdbcbc779 Update to 9.18.7 (#2128609)
https://downloads.isc.org/isc/bind9/9.18.7/doc/arm/html/notes.html#notes-for-bind-9-18-7
2022-09-21 15:54:53 +02:00