Path to this page:
./
net/bind911,
Berkeley Internet Name Daemon implementation of DNS, version 9.11
Branch: pkgsrc-2018Q4,
Version: 9.11.5pl4,
Package name: bind-9.11.5pl4,
Maintainer: pkgsrc-usersBIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:
- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self
This package contains the BIND 9.11 release.
- Catalog Zones, a new method for provisioning servers
- "dnstap", a fast and flexible method of capturing and logging
DNS traffic.
- "dyndb", a new API for loading zone data from an external database
- dnssec-keymgr, a new key mainenance utility
- mdig, an alternate version of dig utility
- And more...
Required to build:[
pkgtools/cwrappers]
Package options: inet6, readline, threads
Master sites:
SHA1: f44a7abaab3946f5c60894a797e575cc7c74f01c
RMD160: 3df68a3763291d9c93a2a6a1366bc7a2da4582bd
Filesize: 8612.342 KB
Version history: (Expand)
- (2019-03-04) Updated to version: bind-9.11.5pl4
- (2019-01-02) Package added to pkgsrc.se, version bind-9.11.5pl1 (created)
CVS history: (Expand)
2019-03-04 17:51:36 by Benny Siegert | Files touched by this commit (2) | |
Log message:
Pullup ticket #5917 - requested by taca
net/bind911: security fix
Revisions pulled up:
- net/bind911/Makefile 1.7
- net/bind911/distinfo 1.6
---
Module Name: pkgsrc
Committed By: taca
Date: Fri Feb 22 01:22:38 UTC 2019
Modified Files:
pkgsrc/net/bind911: Makefile distinfo
Log message:
net/bind911: update to 9.11.5pl4
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).
--- 9.11.5-P4 released ---
--- 9.11.5-P3 released (withdrawn) ---
5141. [security] Zone transfer controls for writable DLZ zones were
not effective as the allowzonexfr method was not being
called for such zones. (CVE-2019-6465) [GL #790]
--- 9.11.5-P2 released (withdrawn) ---
5118. [security] Named could crash if it is managing a key with
`managed-keys` and the authoritative zone is rolling
the key to an unsupported algorithm. (CVE-2018-5745)
[GL #780]
5110. [security] Named leaked memory if there were multiple Key Tag
EDNS options present. (CVE-2018-5744) [GL #772]
|