Path to this page:
./
net/bind96,
Version 9.6 of the Berkeley Internet Name Daemon, implementation of DNS
Branch: pkgsrc-2012Q3,
Version: 9.6.3.1.ESV.7pl4,
Package name: bind-9.6.3.1.ESV.7pl4,
Maintainer: pkgsrc-usersBIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:
- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self
This package contains the BIND 9.6 release.
Required to build:[
devel/libtool-base] [
lang/perl5]
Package options: inet6, threads
Master sites: (Expand)
SHA1: fc069ac53d336b6ebe2070e2c034edd6ea6c3264
RMD160: dc708516e8b6dd42a6ce637dda82b989deb22aaf
Filesize: 6268.859 KB
Version history: (Expand)
- (2012-10-10) Updated to version: bind-9.6.3.1.ESV.7pl4
- (2012-10-02) Package added to pkgsrc.se, version bind-9.6.3.1.ESV.7pl3 (created)
CVS history: (Expand)
2012-10-10 14:33:06 by Matthias Scheler | Files touched by this commit (2) | |
Log message:
Pullup ticket #3941 - requested by taca
net/bind96: security update
Revisions pulled up:
- net/bind96/Makefile 1.31-1.32
- net/bind96/distinfo 1.21
---
Module Name: pkgsrc
Committed By: wiz
Date: Wed Oct 3 21:59:10 UTC 2012
Modified Files:
pkgsrc/net/bind96: Makefile
Log message:
Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.
I hope that's all of them.
---
Module Name: pkgsrc
Committed By: taca
Date: Wed Oct 10 03:04:57 UTC 2012
Modified Files:
pkgsrc/net/bind96: Makefile distinfo
Log message:
Update bind96 to 9.6.3.1.ESV.7pl4 (BIND 9.6-ESV-R7-P4).
Here are change changes from release note. Note security fixes except
CVE-2012-5166 should be already fixed in previous version of bind96 package.
Please refer https://kb.isc.org/article/AA-00795 for list of full bug fixes.
Security Fixes
* A deliberately constructed combination of records could cause named to hang
while populating the additional section of a response. [CVE-2012-5166] [RT
#31090]
* Prevents a named assert (crash) when queried for a record whose RDATA
exceeds 65535 bytes [CVE-2012-4244] [RT #30416]
* Prevents a named assert (crash) when validating caused by using "Bad \
cache"
data before it has been initialized. [CVE-2012-3817] [RT #30025]
* A condition has been corrected where improper handling of zero-length RDATA
could cause undesirable behavior, including termination of the named
process. [CVE-2012-1667] [RT #29644]
New Features
None
Feature Changes
* Improves OpenSSL error logging [RT #29932]
* nslookup now returns a nonzero exit code when it is unable to get an answer.
[RT #29492]
|