/bind99, Berkeley Internet Name Daemon implementation of DNS, version 9.9
9.9.9pl4, Package name:
bind-9.9.9pl4, Maintainer: pkgsrc-users
BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:
- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self
This package contains the BIND 9.9 release.
Required to build:
] Package options
: inet6, readline, threads
Master sites: SHA1:
Version history: (Expand)
- (2016-11-02) Updated to version: bind-9.9.9pl4
- (2016-10-12) Updated to version: bind-9.9.9pl3nb1
- (2016-09-28) Updated to version: bind-9.9.9pl3
- (2016-07-19) Updated to version: bind-9.9.9pl2
- (2016-07-09) Updated to version: bind-9.9.9nb1
- (2016-05-02) Updated to version: bind-9.9.9
CVS history: (Expand)
| 2016-11-06 12:07:00 by Thomas Klausner | Files touched by this commit (1) |
belnet mirror of isc reports 404, remove it.
| 2016-11-02 01:06:09 by Takahiro Kambe | Files touched by this commit (2) | |
Update bind99 to 9.9.9pl4 (BIND 9.9.9-P4).
--- 9.9.9-P4 released ---
4489. [security] It was possible to trigger assertions when processing
a response. (CVE-2016-8864) [RT #43465]
| 2016-10-09 23:42:04 by Thomas Klausner | Files touched by this commit (110) |
Recursive bump for all users of pgsql now that the default is 95.
| 2016-09-27 19:13:42 by Takahiro Kambe | Files touched by this commit (2) | |
Update bind99 to 9.9.9pl3 (BIND 9.9.9-P3), fixing CVE-2016-2776.
--- 9.9.9-P3 released ---
4467. [security] It was possible to trigger a assertion when rendering
a message. (CVE-2016-2776) [RT #43139]
| 2016-07-19 03:05:20 by Takahiro Kambe | Files touched by this commit (2) | |
Update bind99 to 9.9.9pl2 (BIND 9.9.9-P2).
--- 9.9.9-P2 released ---
4406. [bug] getrrsetbyname with a non absolute name could
trigger an infinite recursion bug in lwresd
and named with lwres configured if when combined
with a search list entry the resulting name is
too long. (CVE-2016-2775) [RT #42694]
4405. [bug] Change 4342 introduced a regression where you could
not remove a delegation in a NSEC3 signed zone using
OPTOUT via nsupdate. [RT #42702]
4387. [bug] Change 4336 was not complete leading to SERVFAIL
being return as NS records expired. [RT #42683]
--- 9.9.9-P1 released ---
4366. [bug] Address race condition when updating rbtnode bit
fields. [RT #42379]
4363. [port] win32: Disable explicit triggering UAC when running
| 2016-07-09 08:39:18 by Thomas Klausner | Files touched by this commit (1068) | |
Bump PKGREVISION for perl-5.24.0 for everything mentioning perl.
| 2016-06-08 12:16:57 by Jonathan Perkin | Files touched by this commit (89) |
Remove the stability entity, it has no meaning outside of an official context.
| 2016-06-08 12:02:27 by Jonathan Perkin | Files touched by this commit (44) |
Change the service_bundle name to "export" to reduce diffs between the
original manifest.xml file and the output from "svccfg export".