<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in sdlz.c</title>
    <link>http://nxr.netbsd.org/rss/src/external/mpl/bind/dist/lib/dns/sdlz.c</link>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2005</copyright>
    <generator>Java</generator>
    
<item>
    <title>Merge changes between bind-9.20.11 and 9.20.18</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.15</description>
    <pubDate>Thu Jan 29 18:37:50 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts between 9.18.30 and 9.20.4</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.14</description>
    <pubDate>Sun Jan 26 16:25:25 UTC 2025</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts between 9.18.24 and 9.18.30</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.13</description>
    <pubDate>Sun Sep 22 00:14:06 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.12.2;<br/>merge conflicts between 9.16.42 and 9.18.24</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.12</description>
    <pubDate>Wed Feb 21 22:52:08 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>merge our changes from 9.16.33 to 9.16.37</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.11</description>
    <pubDate>Wed Jan 25 21:43:30 UTC 2023</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.10.2;<br/>Merge conflicts between 9.16.20 and 9.16.33</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.10</description>
    <pubDate>Fri Sep 23 00:15:30 UTC 2022</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>bind: remove unnecessary CONSTCOND comments<br/><br/>Since lint1/tree.c 1.202 from 2021-01-31, lint no longer needs the<br/>/*CONSTCOND*/ for do-while-0 "loops".<br/><br/>No functional change.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.9</description>
    <pubDate>Mon Apr 05 11:27:02 UTC 2021</pubDate>
    <dc:creator>rillig</dc:creator>
</item>

<item>
    <title>merge conflicts, adjust build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.8</description>
    <pubDate>Fri Feb 19 16:42:16 UTC 2021</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts, bump libraries, adjust the build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.7</description>
    <pubDate>Mon Aug 03 17:23:41 UTC 2020</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.6</description>
    <pubDate>Sun May 24 19:46:23 UTC 2020</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>merge bind 9.14.8</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.5</description>
    <pubDate>Wed Nov 27 05:48:41 UTC 2019</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.4.2;  1.4.4;<br/>merge conflicts, bump versions, sync includes</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.4</description>
    <pubDate>Sun Apr 28 00:01:14 UTC 2019</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>merge conflicts, bump major, fix build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.3</description>
    <pubDate>Wed Jan 09 16:55:12 UTC 2019</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.2.2;<br/>merge conflicts, add build glue.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.2</description>
    <pubDate>Sun Aug 12 13:02:35 UTC 2018</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.1.1;<br/>Initial revision</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1</description>
    <pubDate>Sun Aug 12 00:08:17 UTC 2018</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.20.18 (previous was 9.20.11)<br/><br/><br/>BIND 9.20.18#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-13878] Fix incorrect length checks for BRID and HHIT<br/>    records. d4c0d61701<br/><br/>    Malformed BRID and HHIT records could trigger an assertion<br/>    failure. This has been fixed.<br/><br/>    ISC would like to thank Vlatko Kosturjak from Marlink Cyber<br/>    for bringing this vulnerability to our attention. [GL #5616]<br/><br/>Feature Changes#<br/><br/>    Support compilation with cmocka 2.0.0+ bb9234c6ce<br/><br/>    The assert_in_range() function was deprecated in favor of<br/>    assert_int_in_range() and assert_uint_in_range(). Add compatibility<br/>    shims for cmocka&lt;2.0.0 and use the new functions. [GL #5699]<br/>    [GL !11437]<br/><br/>    Add more information to the rndc recursing output about fetches.<br/>    9766feb4df<br/><br/>    This adds more information about the active fetches for debugging<br/>    and diagnostic purposes. [GL !11358]<br/><br/>Bug Fixes#<br/><br/>    Make key rollovers more robust. 7a70d05b5d<br/><br/>    A manual rollover when the zone is in an invalid DNSSEC state<br/>    causes predecessor keys to be removed too quickly. Additional<br/>    safeguards to prevent this have been added. DNSSEC records will<br/>    not be removed from the zone until the underlying state machine<br/>    has moved back into a valid DNSSEC state. [GL #5458] [GL !11329]<br/><br/>    Fix a catalog zones issue when a member zone could fail to<br/>    load. 95cbc2c327<br/><br/>    A catalog zone's member zone could fail to load in some rare<br/>    cases, when the internally generated zone configuration string<br/>    was exceeding 512 bytes. That condition only was not enough<br/>    for the issue to arise, but it was a necessary condition. This<br/>    could happen, for example, if the catalog zone's default primary<br/>    servers list contained a large number of items. This has been<br/>    fixed. [GL #5658] [GL !11349]<br/><br/>    Allow glue in delegations with QTYPE=ANY. 441158ac18<br/><br/>    When a query for type ANY triggered a delegation response, all<br/>    additional data was omitted from the response, including<br/>    mandatory glue. This has been corrected. [GL #5659] [GL !11283]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1b90296e1f<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed. [GL #5671] [GL !11340]<br/><br/>    Fix slow speed of NSEC3 optout large delegation zone signing.<br/>    88f915b77b<br/><br/>    BIND 9.20 takes much more time signing a large delegation zone<br/>    with NSEC3 optout compared to version 9.18. This has been<br/>    restored. [GL #5672] [GL !11362]<br/><br/>    Reconfigure NSEC3 opt-out zone to NSEC causes zone to be invalid.<br/>    1d0e19c612<br/><br/>    A zone that is signed with NSEC3, opt-out enabled, and then<br/>    reconfigured to use NSEC, causes the zone to be published with<br/>    missing NSEC records. This has been fixed. [GL #5679] [GL<br/>    !11401]<br/><br/>    Fix a possible catalog zone issue during reconfiguration.<br/>    911b45b2b3<br/><br/>    The named process could terminate unexpectedly during<br/>    reconfiguration when a catalog zone update was taking place at<br/>    the same time. This has been fixed. [GL !11386]<br/><br/>    Fix the charts in the statistics channel. 7c7b01dd65<br/><br/>    The charts in the statistics channel could sometimes fail to<br/>    render in the browser, and were completely disabled for<br/>    Mozilla-based browsers for historical reasons. This has been<br/>    fixed. [GL !11364]<br/><br/>BIND 9.20.17#<br/><br/>New Features#<br/><br/>    Add spatch to detect implicit bool/int/result cast. 02be363d1f<br/><br/>    Detection of implicit cast from a boolean into an int, or an<br/>    isc_result_t into a boolean (either in an assignement or return<br/>    position).<br/><br/>    If such pattern is found, a warning comment is added into the<br/>    code (and the CI will fails) so the error can be spotted and<br/>    manually fixed. [GL !11237]<br/><br/>Feature Changes#<br/><br/>    Use atomics for CMM_{LOAD,STORE}_SHARED with ThreadSanitizer.<br/>    94fa721705<br/><br/>    Upstream has removed the atomics implementation of CMM_LOAD_SHARED<br/>    and CMM_STORE_SHARED as these can be used also with non-stdatomics<br/>    types. As we only use the CMM api with stdatomics types, we<br/>    can restore the previous behaviour to prevent ThreadSanitizer<br/>    warnings. [GL #5660] [GL !11290]<br/><br/>    Provide more information when the memory allocation fails.<br/>    6749725610<br/><br/>    Provide more information about the failure when the memory<br/>    allocation fails. [GL !11304]<br/><br/>    Reduce the number of outgoing queries. 457b470e96<br/><br/>    Reduces the number of outgoing queries when resolving the<br/>    nameservers for delegation points. This helps the DNS resolver<br/>    with cold cache resolve client queries with complex delegation<br/>    chains and redirections. [GL !11258]<br/><br/>Bug Fixes#<br/><br/>    Fix the spurious timeouts while resolving names. d96cf874fb<br/><br/>    Sometimes the loops in the resolving (e.g. to resolve or validate<br/>    ns1.example.com we need to resolve ns1.example.com) were not<br/>    properly detected leading to spurious 10 seconds delay. This<br/>    has been fixed and such loops are properly detected. [GL #3033],<br/>    #5578 [GL !11298]<br/><br/>    Fix bug where zone switches from NSEC3 to NSEC after retransfer.<br/>    3b40ffbf83<br/><br/>    When a zone is re-transferred, but the zone journal on an<br/>    inline-signing secondary is out of sync, the zone could fall<br/>    back to using NSEC records instead of NSEC3. This has been<br/>    fixed. [GL #5527] [GL !11274]<br/><br/>    Attach socket before async streamdns_resume_processing. bb9451c73f<br/><br/>    Call to streamdns_resume_processing is asynchronous but the<br/>    socket passed as argument is not attached when scheduling the<br/>    call.<br/><br/>    While there is no reproducible way (so far) to make the socket<br/>    reference number down to 0 before streamdns_resume_processing<br/>    is called, attach the socket before scheduling the call. This<br/>    guard against an hypothetic case where, for some reasons, the<br/>    socket refcount would reach 0, and be freed from memory when<br/>    streamdns_resume_processing is called. [GL #5620] [GL !11260]<br/><br/>    AMTRELAY type 0 presentation format handling was wrong. adf104a063<br/><br/>    RFC 8777 specifies a placeholder value of "." for the gateway<br/>    field when the gateway type is 0 (no gateway). This was not<br/>    being checked for nor emitted when displaying the record. This<br/>    has been corrected.<br/><br/>    Instances of this record will need the placeholder period added<br/>    to them when upgrading. [GL #5639] [GL !11255]<br/><br/>    Fix parsing bug in remote-servers with key or tls. d9400c5967<br/><br/>    The remote-servers clause enable the following pattern using<br/>    a named server-list:<br/><br/>    remote-servers a { 1.2.3.4; ... }; remote-servers b { a key<br/>    foo; };<br/><br/>    However, such configuration was wrongly rejected, with an<br/>    "unexpected token 'foo'" error. Such configuration is now<br/>    accepted. [GL #5646] [GL !11300]<br/><br/>    Fix TLS contexts cache object usage bug in the resolver.<br/>    13adf94006<br/><br/>    named could terminate unexpectedly when reconfiguring or<br/>    reloading, and if client-side TLS transport was in use (for<br/>    example, when forwarding queries to a DoT server). This has<br/>    been fixed. [GL #5653] [GL !11299]<br/><br/>    Fix unitiailized pointer check on getipandkeylist. 5ed0cf091b<br/><br/>    Function named_config_getipandkeylist could, in case of error<br/>    in the early code attempting to get the port or tls-port, make<br/>    a pointer check on a non-initialized value. This is now fixed.<br/>    [GL !11306]<br/><br/>    Standardize CHECK and RETERR macros. ef714e91ac<br/><br/>    previously, there were over 40 separate definitions of CHECK<br/>    macros, of which most used "goto cleanup", and the rest "goto<br/>    failure" or "goto out". there were another 10 definitions of<br/>    RETERR, of which most were identical to CHECK, but some simply<br/>    returned a result code instead of jumping to a cleanup label.<br/><br/>    this has now been standardized throughout the code base: RETERR<br/>    is for returning an error code in the case of an error, and<br/>    CHECK is for jumping to a cleanup tag, which is now always<br/>    called "cleanup". both macros are defined in isc/util.h. [GL<br/>    !11069]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1d83a8ad46<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed.<br/><br/>    Closes [#5671](#5671)<br/><br/>BIND 9.20.16#<br/><br/>Feature Changes#<br/><br/>    Fix assertion failure from arc4random_uniform with invalid<br/>    limit. 1040282de7e<br/><br/>    When the arc4random_uniform() is called on NetBSD with upper_bound<br/>    that makes no sense statistically (0 or 1), the call crashes<br/>    the calling program. Fix this by returning 0 when upper bound<br/>    is &lt; 2 as does Linux, FreeBSD and NetBSD. (Hint: System CSPRNG<br/>    should never crash.) [GL #5596] [GL !11151]<br/><br/>Bug Fixes#<br/><br/>    Fix dnssec-keygen key collision checking for KEY rrtype keys.<br/>    ac8b23b80bf<br/><br/>    The dnssec-keygen utility program failed to detect possible<br/>    Key ID collisions with the existing keys generated using the<br/>    non-default -T KEY option (e.g. for SIG(0)). This has been<br/>    fixed. [GL #5506] [GL !11128]<br/><br/>    Fix shutdown INSIST in dns_dispatchmgr_getblackhole. f0aaaef166c<br/><br/>    Previously, named could trigger an assertion in<br/>    dns_dispatchmgr_getblackhole while shutting down. This has been<br/>    fixed. [GL #5525] [GL !11162]<br/><br/>    Dnssec-verify now uses exit code 1 when failing due to illegal<br/>    options. 6ead0aa4a2b<br/><br/>    Previously, dnssec-verify exited with code 0 if the options<br/>    could not be parsed. This has been fixed. [GL #5574] [GL !11129]<br/><br/>    Prevent assertion failures of dig when server is specified<br/>    before the -b option. deada63e2b2<br/><br/>    Previously, dig could exit with an assertion failure when the<br/>    server was specified before the dig -b option. This has been<br/>    fixed. [GL #5609] [GL !11204]<br/><br/>    Skip unsupported algorithms when looking for signing key.<br/>    c346fe88a1b<br/><br/>    A mix of supported and unsupported DNSSEC algorithms in the<br/>    same zone could have caused validation failures. Ignore the<br/>    DNSSEC keys with unsupported algorithm when looking for the<br/>    signing keys. [GL #5622] [GL !11210]<br/><br/>    Fix configuration bugs involving global defaults. a85d6fb581c<br/><br/>    The configuration code for the max-cache-size, dnssec-validation,<br/>    and response-padding options were unnecessarily complicated,<br/>    and in the case of max-cache-size, buggy. These have been fixed.<br/>    The optionmaps variable in configure_view() is no longer needed<br/>    and has been removed. [GL !11172]<br/><br/>    Skip buffer allocations if not logging. 4f601175bd0<br/><br/>    Currently, during IXFR we allocate a 2KB buffer for IXFR change<br/>    logging regardless of the log level. This commit introduces an<br/>    early check on the log level in dns_diff_print to avoid this.<br/><br/>    Results in a speedup from 28% in the test case from issue #5442.<br/>    [GL !11192]<br/><br/>BIND 9.20.15#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-8677] DNSSEC validation fails if matching but invalid<br/>    DNSKEY is found. 0d676bf9f23<br/><br/>    Previously, if a matching but cryptographically invalid key<br/>    was encountered during DNSSEC validation, the key was skipped<br/>    and not counted towards validation failures. named now treats<br/>    such DNSSEC keys as hard failures and the DNSSEC validation<br/>    fails immediately, instead of continuing with the next DNSKEYs<br/>    in the RRset.<br/><br/>    ISC would like to thank Zuyao Xu and Xiang Li from the All-in-One<br/>    Security and Privacy Laboratory at Nankai University for bringing<br/>    this vulnerability to our attention. [GL #5343]<br/><br/>    [CVE-2025-40778] Address various spoofing attacks. 23de94fd236<br/><br/>    Previously, several issues could be exploited to poison a DNS<br/>    cache with spoofed records for zones which were not DNSSEC-signed<br/>    or if the resolver was configured to not do DNSSEC validation.<br/>    These issues were assigned CVE-2025-40778 and have now been<br/>    fixed.<br/><br/>    As an additional layer of protection, named no longer accepts<br/>    DNAME records or extraneous NS records in the AUTHORITY section<br/>    unless these are received via spoofing-resistant transport<br/>    (TCP, UDP with DNS cookies, TSIG, or SIG(0)).<br/><br/>    ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu,<br/>    and Haixin Duan from Tsinghua University for bringing this<br/>    vulnerability to our attention. [GL #5414]<br/><br/>    [CVE-2025-40780] Cache-poisoning due to weak pseudo-random<br/>    number generator. 34af35c2df8<br/><br/>    It was discovered during research for an upcoming academic<br/>    paper that a xoshiro128** internal state can be recovered by<br/>    an external 3rd party, allowing the prediction of UDP ports<br/>    and DNS IDs in outgoing queries. This could lead to an attacker<br/>    spoofing the DNS answers with great efficiency and poisoning<br/>    the DNS cache.<br/><br/>    The internal random generator has been changed to a cryptographically<br/>    secure pseudo-random generator.<br/><br/>    ISC would like to thank Prof. Amit Klein and Omer Ben Simhon<br/>    from Hebrew University of Jerusalem for bringing this vulnerability<br/>    to our attention. [GL #5484]<br/><br/>New Features#<br/><br/>    Add dnssec-policy keys configuration check to named-checkconf.<br/>    1f5a0405f72<br/><br/>    A new option -k is added to named-checkconf that allows checking<br/>    the dnssec-policy keys configuration against the configured<br/>    key stores. If the found key files are not in sync with the<br/>    given dnssec-policy, the check will fail.<br/><br/>    This is useful to run before migrating to dnssec-policy. [GL<br/>    #5486] [GL !11011]<br/><br/>Feature Changes#<br/><br/>    Minor refactor of dst code. c6acbaa020b<br/><br/>    Convert the defines to enums. Initialize the tags more explicitly<br/>    and less ugly. [GL !11038]<br/><br/>Bug Fixes#<br/><br/>    Use signer name when disabling DNSSEC algorithms. 986816baa74<br/><br/>    disable-algorithms could cause DNSSEC validation failures when<br/>    the parent zone was signed with the algorithms that were being<br/>    disabled for the child zone. This has been fixed; disable-algorithms<br/>    now works on a whole-of-zone basis.<br/><br/>    If the zone's name is at or below the disable-algorithms name<br/>    the algorithm is disabled for that zone, using deepest match<br/>    when there are multiple disable-algorithms clauses. [GL #5165]<br/>    [GL !11014]<br/><br/>    Rndc sign during ZSK rollover will now replace signatures.<br/>    d2f551140cd<br/><br/>    When performing a ZSK rollover, if the new DNSKEY is omnipresent,<br/>    the rndc sign command now signs the zone completely with the<br/>    successor key, replacing all zone signatures from the predecessor<br/>    key with new ones. [GL #5483] [GL !11017]<br/><br/>    Missing DNSSEC information when CD bit is set in query.<br/>    968a6be41fb<br/><br/>    The RRSIGs for glue records were not being cached correctly<br/>    for CD=1 queries. This has been fixed. [GL #5502] [GL !10956]<br/><br/>    Preserve cache when reload fails and reload the server again.<br/>    975aeda10b4<br/><br/>    Fixes an issue where failing to reconfigure/reload the server<br/>    would prevent to preserved the views caches on the subsequent<br/>    server reconfiguration/reload. [GL #5523] [GL !10988]<br/><br/>    Check plugin config before registering. e2260b80702<br/><br/>    In named_config_parsefile(), when checking the validity of<br/>    named.conf, the checking of plugin correctness was deliberately<br/>    postponed until the plugin is loaded and registered. However,<br/>    the checking was never actually done: the plugin_register()<br/>    implementation was called, but plugin_check() was not.<br/><br/>    ns_plugin_register() (used by named) now calls the check function<br/>    before the register function, and aborts if either one fails.<br/>    ns_plugin_check() (used by named-checkconf) calls only the<br/>    check function. [GL !11032]<br/><br/>BIND 9.20.14#<br/><br/>Note<br/><br/>The BIND 9.20.14 release was withdrawn after the discovery of a<br/>regression in a security fix in it during pre-release testing.<br/>BIND 9.20.13# New Features#<br/><br/>    Add manual mode configuration option to dnsec-policy. 1e435b107f<br/><br/>    Add a new option manual-mode to dnssec-policy. The intended<br/>    use is that if it is enabled, it will not automatically move<br/>    to the next state transition, but instead the transition is<br/>    logged. Only after manual confirmation with rndc dnssec -step<br/>    the transition is made. [GL #4606] [GL !10880]<br/><br/>    Add a new 'servfail-until-ready' configuration option for RPZ.<br/>    925af17d21<br/><br/>    By default, when named is started it may start answering to<br/>    queries before the response policy zones are completely loaded<br/>    and processed. This new feature gives an option to the users<br/>    to tell named that incoming requests should result in SERVFAIL<br/>    answer until all the response policy zones are processed and<br/>    ready. Note that if one or more response policy zones fail to<br/>    load, named starts responding to queries according to those<br/>    zones that did load.<br/><br/>    Note, that enabling this option has no effect when a DNS Response<br/>    Policy Service (DNSRPS) interface is used. [GL #5222] [GL<br/>    !10889]<br/><br/>    Support for parsing HHIT and BRID records has been added.<br/>    1f051af24d<br/><br/>    [GL #5444] [GL !10932]<br/><br/>Removed Features#<br/><br/>    Deprecate the "tkey-gssapi-credential" statement. b239a70cac<br/><br/>    The tkey-gssapi-keytab statement allows GSS-TSIG to be set up<br/>    in a simpler and more reliable way than using the<br/>    tkey-gssapi-credential statement and setting environment<br/>    variables (e.g. KRB5_KTNAME). Therefore, the tkey-gssapi-credential<br/>    statement has been deprecated; tkey-gssapi-keytab should be<br/>    used instead.<br/><br/>    For configurations currently using a combination of both<br/>    tkey-gssapi-keytab and tkey-gssapi-credential, the latter should<br/>    be dropped and the keytab pointed to by tkey-gssapi-keytab<br/>    should now only contain the credential previously specified by<br/>    tkey-gssapi-credential. [GL #4204] [GL !10924]<br/><br/>    Obsolete the "tkey-domain" statement. 9352ae65d7<br/><br/>    Mark the tkey-domain statement as obsolete, since it has not<br/>    had any effect on server behavior since support for TKEY Mode<br/>    2 (Diffie-Hellman) was removed (in BIND 9.20.0). [GL #4204]<br/>    [GL !10926]<br/><br/>Feature Changes#<br/><br/>    Update clang-format style with options added in newer versions.<br/>    0c2c477c31<br/><br/>    Add and apply InsertBraces statement to add missing curly braces<br/>    around one-line statements and use ControlStatementsExceptControlMacros<br/>    for SpaceBeforeParens to remove space between foreach macro<br/>    and the brace, e.g. FOREACH (x) { becomes FOREACH(x) {. [GL<br/>    !10864]<br/><br/>Bug Fixes#<br/><br/>    Ensure file descriptors 0-2 are in use. 35dee6eb90<br/><br/>    libuv expect file descriptors &lt;= STDERR_FILENO are in use.<br/>    otherwise, it may abort when closing a file descriptor it<br/>    opened. [GL #5226] [GL !10908]<br/><br/>    Prevent spurious SERVFAILs for certain 0-TTL resource records.<br/>    6b266b222c<br/><br/>    Under certain circumstances, BIND 9 can return SERVFAIL when<br/>    updating existing entries in the cache with new NS, A, AAAA,<br/>    or DS records with 0-TTL. [GL #5294] [GL !10898]<br/><br/>    Use DNS_RDATACOMMON_INIT to hide branch differences. a64df9729b<br/><br/>    Initialization of the common members of rdata type structures<br/>    varies across branches. Standardize it by using the<br/>    DNS_RDATACOMMON_INIT macro for all types, so that new types<br/>    are more likely to use it, and hence backport more cleanly.<br/>    [GL #5467] [GL !10834]<br/><br/>    RPZ canonical warning displays zone entry incorrectly. d833676515<br/><br/>    When an IPv6 rpz prefix entry is entered incorrectly the log<br/>    message was just displaying the prefix rather than the full<br/>    entry. This has been corrected. [GL #5491] [GL !10930]<br/><br/>    Fix a catalog zone issue when having an unset 'default-primaries'<br/>    configuration clause. 293e75af28<br/><br/>    A catalog zone with an unset default-primaries clause could<br/>    cause an unexpected termination of the named process after two<br/>    reloading or reconfiguration commands. This has been fixed.<br/>    [GL #5494] [GL !10905]<br/><br/>    Add and use __attribute__((nonnull)) in dnssec-signzone.c.<br/>    a8eed36d3e<br/><br/>    Clang 20 was spuriously warning about the possibility of passing<br/>    a NULL file pointer to fprintf(), which uses the 'nonnull'<br/>    attribute. To silence the warning, the functions calling<br/>    fprintf() have been marked with the same attribute to assure<br/>    that NULL can't be passed to them in the first place.<br/><br/>    Close #5487 [GL !10913]<br/><br/>    RPZ 'servfail-until-ready': skip updating SERVFAIL cache.<br/>    af2fb26325<br/><br/>    In order to not pollute the SERVFAIL cache with the configured<br/>    SERVFAIL answers while RPZ is loading, set the NS_CLIENTATTR_NOSETFC<br/>    attribute for the client. [GL !10940]<br/><br/>BIND 9.20.12#<br/><br/>New Features#<br/><br/>    Support for parsing the DSYNC record has been added. f440fe712d<br/><br/>    [GL #5440] [GL !10820]<br/><br/>Feature Changes#<br/><br/>    Adaptive memory allocation strategy for qp-tries. 9a046cbed5<br/><br/>    qp-tries allocate their nodes (twigs) in chunks to reduce<br/>    allocator pressure and improve memory locality. The choice of<br/>    chunk size presents a tradeoff: larger chunks benefit qp-tries<br/>    with many values (as seen in large zones and resolvers) but<br/>    waste memory in smaller use cases.<br/><br/>    Previously, our fixed chunk size of 2^10 twigs meant that even<br/>    an empty qp-trie would consume 12KB of memory, while reducing<br/>    this size would negatively impact resolver performance.<br/><br/>    This MR implements an adaptive chunking strategy that tracks<br/>    the size of the most recently allocated chunk and doubles the<br/>    chunk size for each new allocation until reaching a predefined<br/>    maximum.<br/><br/>    This approach effectively balances memory efficiency for small<br/>    tries while maintaining the performance benefits of larger<br/>    chunk sizes for bigger data structures. [GL #5445] [GL !10804]<br/><br/>    Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1 and DS<br/>    digest type 1. 5aefaa4b97<br/><br/>    RSASHA1 and RSASHA1-NSEC-SHA1 DNSKEY algorithms have been<br/>    deprecated by the IETF and should no longer be used for DNSSEC.<br/>    DS digest type 1 (SHA1) has also been deprecated. Validators<br/>    are now expected to treat these algorithms and digest as unknown,<br/>    resulting in some zones being treated as insecure when they<br/>    were previously treated as secure. Warnings have been added to<br/>    named and tools when these algorithms and this digest are being<br/>    used for signing.<br/><br/>    Zones signed with RSASHA1 or RSASHA1-NSEC-SHA1 should be migrated<br/>    to a different DNSKEY algorithm.<br/><br/>    Zones with DS or CDS records with digest type 1 (SHA1) should<br/>    be updated to use a different digest type (e.g. SHA256) and<br/>    the digest type 1 records should be removed.<br/><br/>    Related to #5358 [GL !10738]<br/><br/>Bug Fixes#<br/><br/>    Stale RRsets in a CNAME chain were not always refreshed.<br/>    ed37c7825e<br/><br/>    With serve-stale enabled, a CNAME chain that contains a stale<br/>    RRset, the refresh query doesn't always properly refresh the<br/>    stale RRsets. This has been fixed. [GL #5243] [GL !10767]<br/><br/>    Add RPZ extended DNS error for zones with a CNAME override<br/>    policy configured. 39ad2016c1<br/><br/>    When the zone is configured with a CNAME override policy, or<br/>    the response policy zone contains a wildcard CNAME, the extended<br/>    DNS error code was not added. This has been fixed. [GL #5342]<br/>    [GL !10819]<br/><br/>    Fix a possible crash when adding a zone while recursing.<br/>    7a3ec8dd94<br/><br/>    A query for a zone that was not yet loaded may yield an unexpected<br/>    result such as a CNAME or DNAME, triggering an assertion failure.<br/>    This has been fixed. [GL #5357] [GL !10718]<br/><br/>    Fix dig issues. 8c50819aa8<br/><br/>    When used with the +keepopen option with a TCP connection,<br/>    iscman:dig could terminate unexpectedly in rare situations.<br/>    Additionally, iscman:dig could hang and fail to shutdown properly<br/>    when interrupted during a query. These have been fixed. [GL<br/>    #5381] [GL !10727]<br/><br/>    Log dropped or slipped responses in the query-errors category.<br/>    47470b586d<br/><br/>    Responses which were dropped or slipped because of RRL (Response<br/>    Rate Limiting) were logged in the rate-limit category instead<br/>    of the query-errors category, as documented in ARM. This has<br/>    been fixed. [GL #5388] [GL !10725]<br/><br/>    Separate out adbname type flags. fc689c6525<br/><br/>    There are three adbname flags that are used to identify different<br/>    types of adbname lookups when hashing rather than using multiple<br/>    hash tables. Separate these to their own structure element as<br/>    these need to be able to be read without locking the adbname<br/>    structure. [GL #5404] [GL !10695]<br/><br/>    Synth-from-dnssec was not working in some scenarios. bc54f059e0<br/><br/>    Aggressive use of DNSSEC-Validated cache with NSEC was not<br/>    working in scenarios when no parent NSEC was not in cache. This<br/>    has been fixed. [GL #5422] [GL !10754]<br/><br/>    Clean enough memory when adding new ADB names/entries under<br/>    memory pressure. b7e7923daa<br/><br/>    The ADB memory cleaning is opportunistic even when we are under<br/>    memory pressure (in the overmem condition). Split the opportunistic<br/>    LRU cleaning and overmem cleaning and make the overmem cleaning<br/>    always cleanup double of the newly allocated adbname/adbentry<br/>    to ensure we never allocate more memory than the assigned limit.<br/>    [GL !10707]<br/><br/>    Prevent spurious validation failures. 3b98c7cc9d<br/><br/>    Under rare circumstances, validation could fail if multiple<br/>    clients simultaneously iterated the same set of signatures.<br/><br/>    References #3014 [GL !10815]<br/><br/>    Rename variable called 'free' to prevent the clash with free()<br/>    7f25d92c5d<br/><br/>    [GL !10757]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1.1.13</description>
    <pubDate>Thu Jan 29 18:19:53 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.20.4. Previous was 9.18.30. The changes are too voluminous to<br/>list here and can be found in:<br/>https://downloads.isc.org/isc/bind9/cur/9.20/doc/arm/html/changelog.html</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1.1.12</description>
    <pubDate>Sun Jan 26 16:12:34 UTC 2025</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.18.30 (previous was 9.18.24)<br/><br/>Changes:<br/><br/>BIND 9.18.30</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1.1.11</description>
    <pubDate>Sun Sep 22 00:06:17 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.18.24 (previous was 9.16.42)<br/><br/>	--- 9.18.24 released ---<br/><br/>6343.	[bug]		Fix case insensitive setting for isc_ht hashtable.<br/>			[GL #4568]<br/><br/>	--- 9.18.23 released ---<br/><br/>6322.	[security]	Specific DNS answers could cause a denial-of-service<br/>			condition due to DNS validation taking a long time.<br/>			(CVE-2023-50387) [GL #4424]<br/><br/>6321.	[security]	Change 6315 inadvertently introduced regressions that<br/>			could cause named to crash. [GL #4234]<br/><br/>6320.	[bug]		Under some circumstances, the DoT code in client<br/>			mode could process more than one message at a time when<br/>			that was not expected. That has been fixed. [GL #4487]<br/><br/>	--- 9.18.22 released ---<br/><br/>6319.	[func]		Limit isc_task_send() overhead for RBTDB tree pruning.<br/>			[GL #4383]<br/><br/>6317.	[security]	Restore DNS64 state when handling a serve-stale timeout.<br/>			(CVE-2023-5679) [GL #4334]<br/><br/>6316.	[security]	Specific queries could trigger an assertion check with<br/>			nxdomain-redirect enabled. (CVE-2023-5517) [GL #4281]<br/><br/>6315.	[security]	Speed up parsing of DNS messages with many different<br/>			names. (CVE-2023-4408) [GL #4234]<br/><br/>6314.	[bug]		Address race conditions in dns_tsigkey_find().<br/>			[GL #4182]<br/><br/>6312.	[bug]		Conversion from NSEC3 signed to NSEC signed could<br/>			temporarily put the zone into a state where it was<br/>			treated as unsigned until the NSEC chain was built.<br/>			Additionally conversion from one set of NSEC3 parameters<br/>			to another could also temporarily put the zone into a<br/>			state where it was treated as unsigned until the new<br/>			NSEC3 chain was built. [GL #1794] [GL #4495]<br/><br/>6310.	[bug]		Memory leak in zone.c:sign_zone. When named signed a<br/>			zone it could leak dst_keys due to a misplaced<br/>			'continue'. [GL #4488]<br/><br/>6306.	[func]		Log more details about the cause of "not exact" errors.<br/>			[GL #4500]<br/><br/>6304.	[bug]		The wrong time was being used to determine what RRSIGs<br/>			where to be generated when dnssec-policy was in use.<br/>			[GL #4494]<br/><br/>6302.	[func]		The "trust-anchor-telemetry" statement is no longer<br/>			marked as experimental. This silences a relevant log<br/>			message that was emitted even when the feature was<br/>			explicitly disabled. [GL #4497]<br/><br/>6300.	[bug]		Fix statistics export to use full 64 bit signed numbers<br/>			instead of truncating values to unsigned 32 bits.<br/>			[GL #4467]<br/><br/>6299.	[port]		NetBSD has added 'hmac' to libc which collides with our<br/>			use of 'hmac'. [GL #4478]<br/><br/>	--- 9.18.21 released ---<br/><br/>6297.	[bug]		Improve LRU cleaning behaviour. [GL #4448]<br/><br/>6296.	[func]		The "resolver-nonbackoff-tries" and<br/>			"resolver-retry-interval" options are deprecated;<br/>			a warning will be logged if they are used. [GL #4405]<br/><br/>6294.	[bug]		BIND might sometimes crash after startup or<br/>			re-configuration when one 'tls' entry is used multiple<br/>			times to connect to remote servers due to initialisation<br/>			attempts from contexts of multiple threads. That has<br/>			been fixed. [GL #4464]<br/><br/>6290.	[bug]		Dig +yaml will now report "no servers could be reached"<br/>			also for UDP setup failure when no other servers or<br/>			tries are left. [GL #1229]<br/><br/>6287.	[bug]		Recognize escapes when reading the public key from file.<br/>			[GL !8502]<br/><br/>6286.	[bug]		Dig +yaml will now report "no servers could be reached"<br/>			on TCP connection failure as well as for UDP timeouts.<br/>			[GL #4396]<br/><br/>6282.	[func]		Deprecate AES-based DNS cookies. [GL #4421]<br/><br/>	--- 9.18.20 released ---<br/><br/>6280.	[bug]		Fix missing newlines in the output of "rndc nta -dump".<br/>			[GL !8454]<br/><br/>6277.	[bug]		Take into account local authoritative zones when<br/>			falling back to serve-stale. [GL #4355]<br/><br/>6275.	[bug]		Fix assertion failure when using lock-file configuration<br/>			option together -X argument to named. [GL #4386]<br/><br/>6274.	[bug]		The 'lock-file' file was being removed when it<br/>			shouldn't have been making it ineffective if named was<br/>			started 3 or more times. [GL #4387]<br/><br/>6271.	[bug]		Fix a shutdown race in dns__catz_update_cb(). [GL #4381]<br/><br/>6269.	[maint]		B.ROOT-SERVERS.NET addresses are now 170.247.170.2 and<br/>			2801:1b8:10::b. [GL #4101]<br/><br/>6267.	[func]		The timeouts for resending zone refresh queries over UDP<br/>			were lowered to enable named to more quickly determine<br/>			that a primary is down. [GL #4260]<br/><br/>6265.	[bug]		Don't schedule resign operations on the raw version<br/>			of an inline-signing zone. [GL #4350]<br/><br/>6261.	[bug]		Fix a possible assertion failure on an error path in<br/>			resolver.c:fctx_query(), when using an uninitialized<br/>			link. [GL #4331]<br/><br/>6254.	[cleanup]	Add semantic patch to do an explicit cast from char<br/>			to unsigned char in ctype.h class of functions.<br/>			[GL #4327]<br/><br/>6252.	[test]		Python system tests have to be executed by invoking<br/>			pytest directly. Executing them with the legacy test<br/>			runner is no longer supported. [GL #4250]<br/><br/>6250.	[bug]		The wrong covered value was being set by<br/>			dns_ncache_current for RRSIG records in the returned<br/>			rdataset structure. This resulted in TYPE0 being<br/>			reported as the covered value of the RRSIG when dumping<br/>			the cache contents. [GL #4314]<br/><br/>	--- 9.18.19 released ---<br/><br/>6246.	[security]	Fix use-after-free error in TLS DNS code when sending<br/>			data. (CVE-2023-4236) [GL #4242]<br/><br/>6245.	[security]	Limit the amount of recursion that can be performed<br/>			by isccc_cc_fromwire. (CVE-2023-3341) [GL #4152]<br/><br/>6244.	[bug]		Adjust log levels on malformed messages to NOTICE when<br/>			transferring in a zone. [GL #4290]<br/><br/>6241.	[bug]		Take into account the possibility of partial TLS writes<br/>			in TLS DNS code. That helps to prevent DNS messages<br/>			corruption on long DNS over TLS streams. [GL #4255]<br/><br/>6240.	[bug]		Use dedicated per-worker thread jemalloc memory<br/>			arenas for send buffers allocation to reduce memory<br/>			consumption and avoid lock contention. [GL #4038]<br/><br/>6239.	[func]		Deprecate the 'dnssec-must-be-secure' option.<br/>			[GL #3700]<br/><br/>6237.	[bug]		Address memory leaks due to not clearing OpenSSL error<br/>			stack. [GL #4159]<br/><br/>6235.	[doc]		Clarify BIND 9 time formats. [GL #4266]<br/><br/>6234.	[bug]		Restore stale-refresh-time value after flushing the<br/>			cache. [GL #4278]<br/><br/>6232.	[bug]		Following the introduction of krb5-subdomain-self-rhs<br/>			and ms-subdomain-self-rhs update rules, removal of<br/>			nonexistent PTR and SRV records via UPDATE could fail.<br/>			[GL #4280]<br/><br/>6231.	[func]		Make nsupdate honor -v for SOA requests if the server<br/>			is specified. [GL #1181]<br/><br/>6230.	[bug]		Prevent an unnecessary query restart if a synthesized<br/>			CNAME target points to the CNAME owner. [GL #3835]<br/><br/>6227.	[bug]		Check the statistics-channel HTTP Content-length<br/>			to prevent negative or overflowing values from<br/>			causing a crash. [GL #4125]<br/><br/>6224.	[bug]		Check the If-Modified-Since value length to prevent<br/>			out-of-bounds write. [GL #4124]<br/><br/>	--- 9.18.18 released ---<br/><br/>6220.	[func]		Deprecate the 'dialup' and 'heartbeat-interval'<br/>			options. [GL #3700]<br/><br/>6219.	[bug]		Ignore 'max-zone-ttl' on 'dnssec-policy insecure'.<br/>			[GL #4032]<br/><br/>6215.	[protocol]	Return REFUSED to GSS-API TKEY requests if GSS-API<br/>			support is not configured. [GL #4225]<br/><br/>6213.	[bug]		Mark a primary server as temporarily unreachable if the<br/>			TCP connection attempt times out. [GL #4215]<br/><br/>6212.	[bug]		Don't process detach and close netmgr events when<br/>			the netmgr has been paused. [GL #4200]<br/><br/>	--- 9.18.17 released ---<br/><br/>6206.	[bug]		Add shutdown checks in dns_catz_dbupdate_callback() to<br/>			avoid a race with dns_catz_shutdown_catzs(). [GL #4171]<br/><br/>6205.	[bug]		Restore support to read legacy HMAC-MD5 K file pairs.<br/>			[GL #4154]<br/><br/>6204.	[bug]		Use NS records for relaxed QNAME-minimization mode.<br/>			This reduces the number of queries named makes when<br/>			resolving, as it allows the non-existence of NS RRsets<br/>			at non-referral nodes to be cached in addition to the<br/>			referrals that are normally cached. [GL #3325]<br/><br/>6200.	[bug]		Fix nslookup erroneously reporting a timeout when the<br/>			input is delayed. [GL #4044]<br/><br/>6199.	[bug]		Improve HTTP Connection: header protocol conformance<br/>			in the statistics channel. [GL #4126]<br/><br/>6198.	[func]		Remove the holes in the isc_result_t enum to compact<br/>			the isc_result tables. [GL #4149]<br/><br/>6197.	[bug]		Fix a data race between the dns_zone and dns_catz<br/>			modules when registering/unregistering a database<br/>			update notification callback for a catalog zone.<br/>			[GL #4132]<br/><br/>6196.	[cleanup]	Report "permission denied" instead of "unexpected error"<br/>			when trying to update a zone file on a read-only file<br/>			system. Thanks to Midnight Veil. [GL #4134]<br/><br/>6193.	[bug]		Fix a catz db update notification callback registration<br/>			logic error, which could crash named when receiving an<br/>			AXFR update for a catalog zone while the previous update<br/>			process of the catalog zone was already running.<br/>			[GL #4136]<br/><br/>6166.	[func]		Retry without DNS COOKIE on FORMERR if it appears that<br/>			the FORMERR was due to the presence of a DNS COOKIE<br/>			option. [GL #4049]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1.1.10</description>
    <pubDate>Wed Feb 21 21:54:52 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.16.37 (previous was bind-9.16.33)<br/><br/>	--- 9.16.37 released ---<br/><br/>6067.	[security]	Fix serve-stale crash when recursive clients soft quota<br/>			is reached. (CVE-2022-3924) [GL #3619]<br/><br/>6066.	[security]	Handle RRSIG lookups when serve-stale is active.<br/>			(CVE-2022-3736) [GL #3622]<br/><br/>6064.	[security]	An UPDATE message flood could cause named to exhaust all<br/>			available memory. This flaw was addressed by adding a<br/>			new "update-quota" statement that controls the number of<br/>			simultaneous UPDATE messages that can be processed or<br/>			forwarded. The default is 100. A stats counter has been<br/>			added to record events when the update quota is<br/>			exceeded, and the XML and JSON statistics version<br/>			numbers have been updated. (CVE-2022-3094) [GL #3523]<br/><br/>6062.	[func]		The DSCP implementation, which has only been<br/>			partly operational since 9.16.0, is now marked as<br/>			deprecated. Configuring DSCP values in named.conf<br/>			will cause a warning will be logged. [GL #3773]<br/><br/>6060.	[bug]		Fix a use-after-free bug in dns_zonemgr_releasezone()<br/>			by detaching from the zone manager outside of the write<br/>			lock. [GL #3768]<br/><br/>6059.	[bug]		In some serve stale scenarios, like when following an<br/>			expired CNAME record, named could return SERVFAIL if the<br/>			previous request wasn't successful. Consider non-stale<br/>			data when in serve-stale mode. [GL #3678]<br/><br/>6058.	[bug]		Prevent named from crashing when "rndc delzone"<br/>			attempts to delete a zone added by a catalog zone.<br/>			[GL #3745]<br/><br/>6050.	[bug]		Changes to the RPZ response-policy min-update-interval<br/>			and add-soa options now take effect as expected when<br/>			named is reconfigured. [GL #3740]<br/><br/>6048.	[bug]		Fix a log message error in dns_catz_update_from_db(),<br/>			where serials with values of 2^31 or larger were logged<br/>			incorrectly as negative numbers. [GL #3742]<br/><br/>6045.	[cleanup]	The list of supported DNSSEC algorithms changed log<br/>			level from "warning" to "notice" to match named's other<br/>			startup messages. [GL !7217]<br/><br/>6044.	[bug]		There was an "RSASHA236" typo in a log message.<br/>			[GL !7206]<br/><br/>	--- 9.16.36 released ---<br/><br/>6043.	[bug]		The key file IO locks objects would never get<br/>			deleted from the hashtable due to off-by-one error.<br/>			[GL #3727]<br/><br/>6042.	[bug]		ANY responses could sometimes have the wrong TTL.<br/>			[GL #3613]<br/><br/>6040.	[bug]		Speed up the named shutdown time by explicitly<br/>			canceling all recursing ns_client objects for<br/>			each ns_clientmgr. [GL #3183]<br/><br/>6039.	[bug]		Removing a catalog zone from catalog-zones without<br/>			also removing the referenced zone could leave a<br/>			dangling pointer. [GL #3683]<br/><br/>6031.	[bug]		Move the "final reference detached" log message<br/>			from dns_zone unit to the DEBUG(1) log level.<br/>			[GL #3707]<br/><br/>6024.	[func]		Deprecate 'auto-dnssec'. [GL #3667]<br/><br/>6021.	[bug]		Use the current domain name when checking answers from<br/>			a dual-stack-server. [GL #3607]<br/><br/>6020.	[bug]		Ensure 'named-checkconf -z' respects the check-wildcard<br/>			option when loading a zone.  [GL #1905]<br/><br/>6017.	[bug]		The view's zone table was not locked when it should<br/>			have been leading to race conditions when external<br/>			extensions that manipulate the zone table where in<br/>			use. [GL #3468]<br/><br/>	--- 9.16.35 released ---<br/><br/>6013.	[bug]		Fix a crash that could happen when you change<br/>			a dnssec-policy zone with NSEC3 to start using<br/>			inline-signing. [GL #3591]<br/><br/>6009.	[bug]		Don't trust a placeholder KEYDATA from the managed-keys<br/>			zone by adding it into secroots. [GL #2895]<br/><br/>6008.	[bug]		Fixed a race condition that could cause a crash<br/>			in dns_zone_synckeyzone(). [GL #3617]<br/><br/>6002.	[bug]		Fix a resolver prefetch bug when the record's TTL value<br/>			is equal to the configured prefetch eligibility value,<br/>			but the record was erroneously not treated as eligible<br/>			for prefetching. [GL #3603]<br/><br/>6001.	[bug]		Always call dns_adb_endudpfetch() after calling<br/>			dns_adb_beginudpfetch() for UDP queries in resolver.c,<br/>			in order to adjust back the quota. [GL #3598]<br/><br/>6000.	[bug]		Fix a startup issue on Solaris systems with many<br/>			(reportedly &gt; 510) CPUs. Thanks to Stacey Marshall from<br/>			Oracle for deep investigation of the problem. [GL #3563]<br/><br/>5999.	[bug]		rpz-ip rules could be ineffective in some scenarios<br/>			with CD=1 queries. [GL #3247]<br/><br/>5998.	[bug]		The RecursClients statistics counter could overflow<br/>			in certain resolution scenarios. [GL #3584]<br/><br/>5996.	[bug]		Fix a couple of bugs in cfg_print_duration(), which<br/>			could result in generating incomplete duration values<br/>			when printing the configuration using named-checkconf.<br/>			[GL !6880]<br/><br/>	--- 9.16.34 released ---<br/><br/>5991.	[protocol]	Add support for parsing and validating "dohpath" to<br/>			SVCB. [GL #3544]<br/><br/>5988.	[bug]		Some out of memory conditions in opensslrsa_link.c<br/>			could lead to memory leaks. [GL #3551]<br/><br/>5984.	[func]		'named -V' now reports the list of supported<br/>			DNSSEC/DS/HMAC algorithms and the supported TKEY modes.<br/>			[GL #3541]<br/><br/>5983.	[bug]		Changing just the TSIG key names for primaries in<br/>			catalog zones' member zones was not effective.<br/>			[GL #3557]<br/><br/>5973.	[bug]		Fixed a possible invalid detach in UPDATE<br/>			processing. [GL #3522]<br/><br/>5963.	[bug]		Ensure struct named_server is properly initialized.<br/>			[GL #6531]<br/><br/>5921.	[test]		Convert system tests to use a default DNSKEY algorithm<br/>			where the test is not DNSKEY algorithm specific.<br/>			[GL #3440]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/sdlz.c - 1.1.1.9</description>
    <pubDate>Wed Jan 25 20:36:45 UTC 2023</pubDate>
    <dc:creator>christos</dc:creator>
</item>
</channel></rss>

