./net/bind911, Berkeley Internet Name Daemon implementation of DNS, version 9.11

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2018Q4, Version: 9.11.5pl4, Package name: bind-9.11.5pl4, Maintainer: pkgsrc-users

BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:

- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self

This package contains the BIND 9.11 release.

- Catalog Zones, a new method for provisioning servers
- "dnstap", a fast and flexible method of capturing and logging
DNS traffic.
- "dyndb", a new API for loading zone data from an external database
- dnssec-keymgr, a new key mainenance utility
- mdig, an alternate version of dig utility
- And more...


Required to build:
[pkgtools/cwrappers]

Package options: inet6, readline, threads

Master sites:

SHA1: f44a7abaab3946f5c60894a797e575cc7c74f01c
RMD160: 3df68a3763291d9c93a2a6a1366bc7a2da4582bd
Filesize: 8612.342 KB

Version history: (Expand)


CVS history: (Expand)


   2019-03-04 17:51:36 by Benny Siegert | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #5917 - requested by taca
net/bind911: security fix

Revisions pulled up:
- net/bind911/Makefile                                          1.7
- net/bind911/distinfo                                          1.6

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Fri Feb 22 01:22:38 UTC 2019

   Modified Files:
   	pkgsrc/net/bind911: Makefile distinfo

   Log message:
   net/bind911: update to 9.11.5pl4

   Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

   	--- 9.11.5-P4 released ---

   	--- 9.11.5-P3 released (withdrawn) ---

   5141.	[security]	Zone transfer controls for writable DLZ zones were
   			not effective as the allowzonexfr method was not being
   			called for such zones. (CVE-2019-6465) [GL #790]

   	--- 9.11.5-P2 released (withdrawn) ---

   5118.	[security]	Named could crash if it is managing a key with
   			`managed-keys` and the authoritative zone is rolling
   			the key to an unsupported algorithm. (CVE-2018-5745)
   			[GL #780]

   5110.	[security]	Named leaked memory if there were multiple Key Tag
   			EDNS options present. (CVE-2018-5744) [GL #772]