Knowledge Base ISC Main Website Ask a Question/Contact ISC
BIND 9.9.7-S6 Release Notes
Author: ISC Support Reference Number: AA-01299 Views: 7944 Created: 2015-09-02 18:26 Last Updated: 2015-09-02 18:57 0 Rating/ Voters
Introduction

This document summarizes changes since BIND 9.9.7-S1.

BIND 9.9.7-S6 addresses security issues described in CVE-2015-5722 and CVE-2015-5986.

BIND 9.9.7-S5 addresses a security issue described in CVE-2015-5477.

BIND 9.9.7-S4 addresses a security issue described in CVE-2015-4620.

BIND 9.9.7-S3 addressed several bugs that have been identified in the BIND 9.9 (Subscription Edition) implementation of response-policy zones (RPZ). The bugs are in code which optimizes searching through multiple policy zones. In some cases, they can cause RPZ to behave inefficiently by searching for query matches in more policy zones than are strictly necessary, or to behave unpredictably by failing to search a policy zone that should have been searched. In the worst case, they can lead to assertion failures, terminating named.

9.9.7-S2 was a limited experimental release and has not been published.

Download

BIND 9 Subscription Edition is a special version of BIND provided only to subscribing customers.  Download links have been provided to ISC BIND Subscription customers.  Contact ISC Support if you are a customer needing assistance, or contact ISC Sales if you are interested in an ISC BIND Subscription contract.

Support

Product support information is available on http://www.isc.org/services/support for paid support options. Free support is provided by our user community via a mailing list. Information on all public email lists is available at https://lists.isc.org/mailman/listinfo.  For issues specific to the BIND 9 Subscription Edition, please open a ticket in your organization's ISC Support queue.

Security Fixes
  • An incorrect boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure. This flaw is disclosed in CVE-2015-5986. [RT #40286]
  • A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys.  This flaw was discovered by Hanno Boeck of the Fuzzing Project, and is disclosed in CVE-2015-5722. [RT #40212]
  • A specially crafted query could trigger an assertion failure in message.c.  This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795]
  • On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server.  This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795]
New Features

None

Feature Changes

None

Bug Fixes

None

Thank You

ISC is grateful for the support of our BIND 9 subscription customers, which allows us to continue improving our software.


© 2001-2016 Internet Systems Consortium

Please help us to improve the content of our knowledge base by letting us know below how we can improve this article.

If you have a technical question or problem on which you'd like help, please don't submit it here as article feedback.

For assistance with problems and questions for which you have not been able to find an answer in our Knowledge Base, we recommend searching our community mailing list archives and/or posting your question there (you will need to register there first for your posts to be accepted). The bind-users and the dhcp-users lists particularly have a long-standing and active membership.

ISC relies on the financial support of the community to fund the development of its open source software products. If you would like to support future product evolution and maintenance as well having peace of mind knowing that our team of experts are poised to provide you with individual technical assistance whenever you call upon them, then please consider our Professional Subscription Support services - details can be found on our main website.

Feedback
  • There is no feedback for this article
Info Submit Feedback on this Article
Nickname: Your Email: Subject: Comment:
Enter the code below:
Quick Jump Menu