From 7f1fbcb4e7f7c3a9f7fbeaf715964fa8044fbc93 Mon Sep 17 00:00:00 2001 From: Michal Nowak Date: Thu, 5 May 2022 10:57:16 +0200 Subject: [PATCH] Prepare release notes for BIND 9.19.1 --- doc/arm/notes.rst | 2 +- .../{notes-current.rst => notes-9.19.1.rst} | 17 ----------------- 2 files changed, 1 insertion(+), 18 deletions(-) rename doc/notes/{notes-current.rst => notes-9.19.1.rst} (95%) diff --git a/doc/arm/notes.rst b/doc/arm/notes.rst index 5673978a16..59b037dd45 100644 --- a/doc/arm/notes.rst +++ b/doc/arm/notes.rst @@ -36,7 +36,7 @@ The latest versions of BIND 9 software can always be found at https://www.isc.org/download/. There you will find additional information about each release, and source code. -.. include:: ../notes/notes-current.rst +.. include:: ../notes/notes-9.19.1.rst .. include:: ../notes/notes-9.19.0.rst .. _relnotes_license: diff --git a/doc/notes/notes-current.rst b/doc/notes/notes-9.19.1.rst similarity index 95% rename from doc/notes/notes-current.rst rename to doc/notes/notes-9.19.1.rst index 1ba00c8088..7733f23a8a 100644 --- a/doc/notes/notes-current.rst +++ b/doc/notes/notes-9.19.1.rst @@ -15,8 +15,6 @@ Notes for BIND 9.19.1 Security Fixes ~~~~~~~~~~~~~~ -- None. - - Previously, TLS socket objects could be destroyed prematurely, which triggered assertion failures in :iscman:`named` instances serving DNS-over-HTTPS (DoH) clients. This has been fixed. @@ -25,11 +23,6 @@ Security Fixes bringing this vulnerability to our attention. (CVE-2022-1183) :gl:`#3216` -Known Issues -~~~~~~~~~~~~ - -- None. - New Features ~~~~~~~~~~~~ @@ -61,16 +54,6 @@ New Features diagnosing the problem. :gl:`#3221` :gl:`#3222` :gl:`#3223` :gl:`#3224` :gl:`#3225` -Removed Features -~~~~~~~~~~~~~~~~ - -- None. - -Feature Changes -~~~~~~~~~~~~~~~ - -- None. - Bug Fixes ~~~~~~~~~