./net/bind97, Version 9 of the Berkeley Internet Name Daemon, implementation of DNS

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2011Q2, Version: 9.7.4, Package name: bind-9.7.4, Maintainer: pkgsrc-users

BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:

- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self


Required to build:
[devel/libtool-base] [lang/perl5]

Package options: inet6, threads

Master sites: (Expand)

SHA1: a526bf9a7114988d895e7a9c5be175a8386c6904
RMD160: 2da39514b7b79aa9a3c9ce10c239514dee610194
Filesize: 8121.913 KB

Version history: (Expand)


CVS history: (Expand)


   2011-08-22 23:21:34 by Matthias Scheler | Files touched by this commit (3) | Package updated
Log message:
Pullup ticket #3509 - requested by taca
net/bind97: security update

Revisions pulled up:
- net/bind97/Makefile                                           1.9
- net/bind97/PLIST                                              1.5
- net/bind97/distinfo                                           1.9

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Aug 10 15:26:11 UTC 2011

   Modified Files:
   	pkgsrc/net/bind97: Makefile PLIST distinfo

   Log message:
   Update bind97 package to 9.7.4.

   For full changes, please refer:
   ftp://ftp.isc.org/isc/bind9/9.7.4/RELEASE-NOTES-BIND-9.7.4.html

   New Features

   9.7.4

        * A new test has been added to check the apex NSEC3 records after
          DNSKEY records have been added via dynamic update. [RT #23229]
        * Added a tool able to generate malformed packets to allow testing of
          how named handles them. [RT #24096]

   Security Fixes

   9.7.4

        * named, set up to be a caching resolver, is vulnerable to a user
          querying a domain with very large resource record sets (RRSets)
          when trying to negatively cache the response. Due to an off-by-one
          error, caching the response could cause named to crash. [RT #24650]
          [CVE-2011-1910]
        * Change #2912 (see CHANGES) exposed a latent bug in the DNS message
          processing code that could allow certain UPDATE requests to crash
          named. [RT #24777] [CVE-2011-2464]

   Feature Changes

   9.7.4

        * Merged in the NetBSD ATF test framework (currently version 0.12)
          for development of future unit tests. Use configure --with-atf to
          build ATF internally or configure --with-atf=prefix to use an
          external copy. [RT #23209]
        * Added more verbose error reporting from DLZ LDAP. [RT #23402]
        * Replaced compile time constant with STDTIME_ON_32BITS. [RT #23587]