diff options
Diffstat (limited to 'doc/arm/notes.html')
-rw-r--r-- | doc/arm/notes.html | 34 |
1 files changed, 24 insertions, 10 deletions
diff --git a/doc/arm/notes.html b/doc/arm/notes.html index 77019262df24a..da38378d3218d 100644 --- a/doc/arm/notes.html +++ b/doc/arm/notes.html @@ -21,7 +21,7 @@ </head> <body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article" lang="en"><div class="sect1" lang="en"> <div class="titlepage"><div><div><h2 class="title" style="clear: both"> -<a name="id2542126"></a>Release Notes for BIND Version 9.9.8-P3</h2></div></div></div> +<a name="id2542126"></a>Release Notes for BIND Version 9.9.8-P4</h2></div></div></div> <div class="sect2" lang="en"> <div class="titlepage"><div><div><h3 class="title"> <a name="relnotes_intro"></a>Introduction</h3></div></div></div> @@ -29,6 +29,10 @@ This document summarizes changes since BIND 9.9.8: </p> <p> + BIND 9.9.8-P4 addresses the security issues described in + CVE-2016-1285 and CVE-2016-1286. + </p> +<p> BIND 9.9.8-P3 addresses the security issue described in CVE-2015-8704. It also fixes a serious regression in authoritative server selection that was introduced in 9.9.8. @@ -57,26 +61,35 @@ <a name="relnotes_security"></a>Security Fixes</h3></div></div></div> <div class="itemizedlist"><ul type="disc"> <li><p> + The resolver could abort with an assertion failure due to + improper DNAME handling when parsing fetch reply + messages. This flaw is disclosed in CVE-2016-1286. [RT #41753] + </p></li> +<li><p> + Malformed control messages can trigger assertions in named + and rndc. This flaw is disclosed in CVE-2016-1285. [RT + #41666] + </p></li> +<li><p> Specific APL data could trigger an INSIST. This flaw - was discovered by Brian Mitchell and is disclosed in - CVE-2015-8704. [RT #41396] + is disclosed in CVE-2015-8704. [RT #41396] </p></li> <li><p> - Named is potentially vulnerable to the OpenSSL vulnerabilty + Named is potentially vulnerable to the OpenSSL vulnerability described in CVE-2015-3193. </p></li> <li><p> + Incorrect reference counting could result in an INSIST + failure if a socket error occurred while performing a + lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945] + </p></li> +<li><p> Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. This flaw is disclosed in CVE-2015-8000. [RT #40987] </p></li> -<li><p> - Incorrect reference counting could result in an INSIST - failure if a socket error occurred while performing a - lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945] - </p></li> </ul></div> </div> <div class="sect2" lang="en"> @@ -104,7 +117,8 @@ <div class="titlepage"><div><div><h3 class="title"> <a name="end_of_life"></a>End of Life</h3></div></div></div> <p> - The BIND 9.9 (Extended Support Version) will be supported until June, 2017. + The BIND 9.9 (Extended Support Version) will be supported until + December, 2017. <a href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a> </p> </div> |