Commit Graph

61 Commits

Author SHA1 Message Date
Petr Menšík
e51b6b2b70 Prevent assertion failure if DNS64 and serve-stale is used
Enabling both DNS64 and serve-stale may cause an assertion failure
during recursive resolution.

6317.	[security]	Restore DNS64 state when handling a serve-stale timeout.
			(CVE-2023-5679) [GL #4334]

Resolves: RHEL-25364
; Resolves: CVE-2023-5679
2024-03-26 12:05:32 +01:00
Petr Menšík
e09e829119 Prevent assertion failure when nxdomain-redirect is used with
RFC 1918 reverse zones

6316.	[security]	Specific queries could trigger an assertion check with
			nxdomain-redirect enabled. (CVE-2023-5517) [GL #4281]

Resolves: RHEL-25353
; Resolves: CVE-2023-5517
2024-03-26 12:05:32 +01:00
Petr Menšík
deeca182e3 Prevent increased CPU load on large DNS messages
6315.	[security]	Speed up parsing of DNS messages with many different
			names. (CVE-2023-4408) [GL #4234]
6321.	[security]	Change 6315 inadvertently introduced regressions that
			could cause named to crash. [GL #4234]
6343.	[bug]		Fix case insensitive setting for isc_ht hashtable.

Resolves: RHEL-25342
; Resolves: CVE-2023-4408
2024-03-26 12:05:22 +01:00
Petr Menšík
2b46612566 Update addresses of b.root-servers.net
https://b.root-servers.org/news/2023/05/16/new-addresses.html

Resolves: RHEL-18188
2023-12-07 15:20:38 +01:00
Petr Menšík
814f798219 Fix CVE-2023-3341
6245.	[security]	Limit the amount of recursion that can be performed
			by isccc_cc_fromwire. (CVE-2023-3341) [GL #4152]

Resolves: RHEL-5239
2023-09-20 13:22:16 +02:00
Petr Menšík
12f1cd3444 Fix CVE-2023-2911
6192.	[security]	A query that prioritizes stale data over lookup
			triggers a fetch to refresh the stale data in cache.
			If the fetch is aborted for exceeding the recursion
			quota, it was possible for 'named' to enter an infinite
			callback loop and crash due to stack overflow. This has
			been fixed. (CVE-2023-2911) [GL #4089]

Resolves: CVE-2023-2911
2023-07-19 18:24:02 +02:00
Petr Menšík
d6566b65ba Fix CVE-2023-2828
6190.	[security]	Improve the overmem cleaning process to prevent the
			cache going over the configured limit. (CVE-2023-2828)
			[GL #4055]

Resolves: CVE-2023-2828
2023-07-19 18:09:09 +02:00
Petr Menšík
889db13e6f fixup! Have dns_zt_apply lock the zone table
Correct the change to include important locks.
Correct backport issue in statistics rendering fix.

Resolves: rhbz#2126912
2023-02-27 14:44:05 +01:00
Petr Menšík
dc3f4d28ab Fix small differences to upstream patches
Some small differences went unnoticed and cause system test upforwd
failure. Fix both code change and test to pass.

Resolves: CVE-2022-3094
2023-02-25 03:10:37 +01:00
Petr Menšík
512b305b43 Fix crash when soft-quota is reached and serve-stale is active
6067.	[security]	Fix serve-stale crash when recursive clients soft quota
			is reached. (CVE-2022-3924) [GL #3619]

Resolves: CVE-2022-3924
2023-02-09 17:52:04 +01:00
Petr Menšík
288db36de7 Handle RRSIG queries when server-stale is active
6066.	[security]	Handle RRSIG lookups when serve-stale is active.
			(CVE-2022-3736) [GL #3622]

Resolves: CVE-2022-3736
2023-02-09 17:28:30 +01:00
Petr Menšík
495baa1377 test failure conditions
verify that updates are refused when the client is disallowed by
allow-query, and update forwarding is refused when the client is
is disallowed by update-forwarding.

verify that "too many DNS UPDATEs" appears in the log file when too
many simultaneous updates are processing.

Related: CVE-2022-3094
2023-02-08 18:47:31 +01:00
Petr Menšík
a85d02f014 Prevent flooding with UPDATE requests
6064.	[security]	An UPDATE message flood could cause named to exhaust all
			available memory. This flaw was addressed by adding a
			new "update-quota" statement that controls the number of
			simultaneous UPDATE messages that can be processed or
			forwarded. The default is 100. A stats counter has been
			added to record events when the update quota is
			exceeded, and the XML and JSON statistics version
			numbers have been updated. (CVE-2022-3094) [GL #3523]

Resolves: CVE-2022-3094
2023-02-08 18:47:31 +01:00
Petr Menšík
ca0f46336e Add include to rwlocktype_t to dns/zt.h
It got broken as part of bug #2101712 fix. Introduced new definition,
which passes during bind build, but breaks bind-dyndb-ldap build.

Resolves: rhbz#2162795
2023-01-21 00:03:05 +01:00
Petr Menšík
5a8535ebc5 Have dns_zt_apply lock the zone table
There where a number of places where the zone table should have
been locked, but wasn't, when dns_zt_apply was called.

Added a isc_rwlocktype_t type parameter to dns_zt_apply and adjusted
all calls to using it.  Removed locks in callers.

Backported and modified upstream commit e5068a7e24d7ace5ed7e8fdd3ff789dcc4c10fe8

Resolves: rhbz#2101712
2022-11-10 11:21:26 +01:00
Petr Menšík
60ab1e48dc Add %_libdir/named to bind-chroot
That directory is referenced by /etc/bind-chroot.files, but is not part
of the package. Fix that.

Resolves: rhbz#2129466
2022-10-04 20:14:10 +02:00
Petr Menšík
1594280edc Bound the amount of work performed for delegations
5957.	[security]	Prevent excessive resource use while processing large
			delegations. (CVE-2022-2795) [GL #3394]

Resolves: CVE-2022-2795
2022-10-04 19:52:37 +02:00
Petr Menšík
7b05fe1bfb Fix CVE-2022-38178
5962.	[security]	Fix memory leak in EdDSA verify processing.
			(CVE-2022-38178) [GL #3487]

Resolves: CVE-2022-38178
2022-09-22 22:14:56 +02:00
Petr Menšík
55958c1edb Fix CVE-2022-38177
5961.	[security]	Fix memory leak in ECDSA verify processing.
			(CVE-2022-38177) [GL #3487]

Resolves: CVE-2022-38177
2022-09-22 22:14:56 +02:00
Petr Menšík
e69de99fb9 Fix CVE-2022-3080
5960.	[security]	Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query.
			(CVE-2022-3080) [GL #3517]

Resolves: CVE-2022-3080
2022-09-22 22:14:55 +02:00
Petr Menšík
f05e2e34bd Export bind-doc package
ARM is useful resource and should be shipped also to customers.

Resolves: rhbz#2104863
2022-07-14 13:36:32 +02:00
Petr Menšík
4cefc72f11 Add tests for forwarder cache poisoning scenarios
- Check that an NS in an authority section returned from a forwarder
  which is above the name in a configured "forward first" or "forward
  only" zone (i.e., net/NS in a response from a forwarder configured for
  local.net) is not cached.
- Test that a DNAME for a parent domain will not be cached when sent
  in a response from a forwarder configured to answer for a child.
- Check that glue is rejected if its name falls below that of zone
  configured locally.
- Check that an extra out-of-bailiwick data in the answer section is
  not cached (this was already working correctly, but was not explicitly
  tested before).

Related: CVE-2021-25220
2022-04-11 18:07:08 +02:00
Petr Menšík
68bb3ef214 Tighten cache protection against record from forwarders
5817.	[security]	The rules for acceptance of records into the cache
			have been tightened to prevent the possibility of
			poisoning if forwarders send records outside
			the configured bailiwick. (CVE-2021-25220) [GL #2950]

Resolves: CVE-2021-25220
2022-04-11 18:00:59 +02:00
Petr Menšík
021aeeed38 [CVE-2022-0396] Resolve #3112 TCP sockets stuck in CLOSE_WAIT
5818.	[security]	A synchronous call to closehandle_cb() caused
			isc__nm_process_sock_buffer() to be called recursively,
			which in turn left TCP connections hanging in the
			CLOSE_WAIT state blocking indefinitely when
			out-of-order processing was disabled. (CVE-2022-0396)
			[GL #3112]

Resolves: CVE-2022-0396
2022-03-25 21:03:37 +01:00
Petr Menšík
f35b435d1d Remove merged changes and update changed patch
Adjust downstream patches to changes made upstream.

Resolves: rhbz#2019573
2021-11-23 11:27:00 +01:00
Petr Menšík
befd906113 Update 9.16.23
Reloading a catalog zone which referenced a missing/deleted member zone
triggered a runtime check failure, causing named to exit prematurely.
This has been fixed. [GL #2308]

https://downloads.isc.org/isc/bind9/9.16.23/doc/arm/html/notes.html#notes-for-bind-9-16-23

Resolves: rhbz#2019573 CVE-2021-25219
2021-11-23 11:26:51 +01:00
Petr Menšík
5c9da7c5f9 Propagate system emphemeral ports to chroot
BIND reads default system port ranges from /proc file. Propagate just
that single file to bind chroot. Defaults should be therefore the same
as on named.service.

Resolves: rhbz#2013595
2021-10-13 12:27:59 +02:00
Petr Menšík
31b69a221c Remove the code to adjust listening interfaces for *-source-v6
Previously, named would run with a configuration where *-source-v6 (notify-source-v6,
transfer-source-v6 and query-source-v6) address and port could be simultaneously used
for listening. This is no longer true for BIND 9.16+ and the code that would do
interface adjustments would unexpectedly disable listening on TCP for such interfaces.

Resolves: rhbz#1999691
2021-10-12 13:32:02 +02:00
Petr Menšík
74c48aefdf Ensure return codes make it into generated dig manual
It seems patched version were not catched by build dependencies. Change
include modification to propagate it.

Resolves: rhbz#1989909
2021-10-12 12:55:14 +02:00
Petr Menšík
579299f7df Update gating for RHEL9 2021-08-26 12:45:34 +02:00
Petr Menšík
6e60c9d8a4 Actually enable LMDB in build
Fixes broken commit 25906f35b3, where only
changelog comment remained after cherry-pick.

Resolves: rhbz#1975775
2021-08-24 16:38:08 +02:00
Petr Menšík
d63e24c757 Fix regression in map fileformat compatibility
https://gitlab.isc.org/isc-projects/bind9/-/issues/2872
https://kb.isc.org/docs/map-zone-format-incompatibility-in-bind-9-16-20-and-9-17-17

(cherry picked from commit 50e206624d)

Related: rhbz#1956777
2021-08-24 16:36:58 +02:00
Petr Menšík
4b70312f6d Update to 9.16.20 (#1995289)
(cherry picked from commit 9d509c6973)

Resolves: rhbz#1956777 CVE-2021-25218
2021-08-19 21:12:17 +02:00
Petr Menšík
1fdc7ae892 Do not depend on systemd package
(cherry picked from commit 739136846c)

Related: rhbz#1956777
2021-08-19 21:10:58 +02:00
Petr Menšík
37123a3b7a Include backward compatible html symlink in doc subpackage
(cherry picked from commit dc4646b7fd)

Related: rhbz#1956777
2021-08-19 21:08:39 +02:00
Mohan Boddu
092da5d1c3 Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
Related: rhbz#1991688
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-08-09 19:29:18 +00:00
Petr Menšík
09ac3e24ac Update to 9.16.19
Remove support for PREVER and PATCHVER, since upstream no longer
releases them. Simplifies a bit versioning.

Resolves: rhbz##1956777
2021-07-22 00:32:18 +02:00
Petr Menšík
91c5e974dc Update to 9.16.16
https://downloads.isc.org/isc/bind9/9.16.16/doc/arm/html/notes.html#notes-for-bind-9-16-16

Resolves: rhbz##1956777
2021-07-22 00:31:03 +02:00
Petr Menšík
25906f35b3 Enable LMDB build
Resolves: rhbz#1975775
2021-06-24 15:27:17 +02:00
Petr Menšík
ab74f1f161 Enable DNSTAP feature
Resolves: rhbz#1975268
2021-06-24 15:26:00 +02:00
Petr Menšík
e89ef51a86 Enable rebuilding HTML documentation
Build separate bind-doc package with possibly modified documentation.

Related: rhbz#1956777
2021-06-24 15:06:45 +02:00
Petr Menšík
56a6bb6781 Disable DLZ & PKCS11
Disable features not shipped on RHEL9.
UNITTESTS are unfortunately unavailable, kyua is missing from buildroot.

Related: rhbz#1956777
2021-06-24 15:05:14 +02:00
Mohan Boddu
dc8a7e64a4 Rebuilt for RHEL 9 BETA for openssl 3.0
Related: rhbz#1971065
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-06-16 03:22:33 +00:00
Petr Menšík
a4d7a01bbb Update to 9.16.15
Resolves CVE-2021-25215 and CVE-2021-25214.
Removes disable-isc-spnego flag, because custom isc spnego code were
removed with also this flag. It is default (and the only) option now.

(cherry picked from commit f8cb93d57c)

Resolves: rhbz#1956777
2021-05-04 14:11:01 +02:00
Petr Menšík
348d01cc21 Allow use of isc/util.h without "config.h"
It prevents compilation of bind-dyndb-ldap. Because config.h is never
used by bind-dyndb-ldap, stop exporting it in devel package. It should
be only implementation detail.

(cherry picked from commit 2e4a03677c)

Resolves: rhbz#1956777
2021-05-04 14:09:44 +02:00
Petr Menšík
9f34324bc0 Update to 9.16.13
Reworked custom redhat version. Complete version is now part of library
names. Libraries are not recommended for any third party application.
They are still required for bind-dyndb-ldap only.

Version of named changed, only suffix -RH is appended to upstream
version. Therefore dig would not contain version
9.6.11-RedHat-9.6.11-1.fc34, but only 9.6.13-RH. Version of fedora build
have to be obtained from rpm -q bind.

Version is now part of library names, bind-libs-lite was merged to
bind-libs. bind-dyndb-ldap needs whole bind, no point to offer smaller
library set just for its dependencies.

Updated also named(8) manual page to match current state of SELinux.

(cherry picked from commit 76074cd59a)

Resolves: rhbz#1956777
2021-05-04 14:08:10 +02:00
Petr Menšík
a5885acb52 Freeipa tests were wrong and matched elsewhere
OpenQA tests are already started for critpath components. Freeipa
results are checked by Fedora critpath checks, it does not need to be in
gating.yaml.

Check fedora-infra/ansible repo,
roles/openshift-apps/greenwave/templates/fedora.yaml for details.

(cherry picked from commit f182202f6e)

Related: rhbz#1956777
2021-05-04 14:05:31 +02:00
Mohan Boddu
2c75a8e440 - Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
Signed-off-by: Mohan Boddu <mboddu@redhat.com>
2021-04-15 22:43:51 +00:00
DistroBaker
432cf22759 Merged update from upstream sources
This is an automated DistroBaker update from upstream sources.
If you do not know what this is about or would like to opt out,
contact the OSCI team.

Source: https://src.fedoraproject.org/rpms/bind.git#d4a07bb1cc9a5065239e1dcf656d5de44d45b40e
2021-03-11 20:19:38 +00:00
DistroBaker
b4d56cd9f3 Merged update from upstream sources
This is an automated DistroBaker update from upstream sources.
If you do not know what this is about or would like to opt out,
contact the OSCI team.

Source: https://src.fedoraproject.org/rpms/bind.git#8713f270d5e970ec15fece7051a4fc50cdbd9eda
2021-02-03 11:40:41 +01:00