Next | Query returned 56 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2015-02-19 15:50:31 by Takahiro Kambe | Files touched by this commit (15) | Package removed
Log message:
Remove bind96 which was EOL Feb, 2014.
   2014-05-30 01:38:20 by Thomas Klausner | Files touched by this commit (3049)
Log message:
Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
   2014-03-11 15:05:19 by Jonathan Perkin | Files touched by this commit (350)
Log message:
Remove example rc.d scripts from PLISTs.

These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
   2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568)
Log message:
Recursive PKGREVISION bump for OpenSSL API version bump.
   2014-02-02 08:55:46 by Takahiro Kambe | Files touched by this commit (4)
Log message:
Update bind96 to 9.6.3.1.ESV.11 (BIND 9.6-ESV-R11).

Security fixes were already covered by 9.6.3.1.ESV.10pl2 and this is
the final release of 9.6.ESV.

Several bug fixes and clean up, please refer CHANGES file in detail.
   2014-01-13 18:27:09 by Takahiro Kambe | Files touched by this commit (3)
Log message:
Update bind96 to bind-9.6.3.1.ESV.10pl2 (BIND 9.6-ESV-R10-P2), security
fix for CVE-2014-0591.

	--- 9.6-ESV-R10-P2 released ---

3693.	[security]	memcpy was incorrectly called with overlapping
			ranges resulting in malformed names being generated
			on some platforms.  This could cause INSIST failures
			when serving NSEC3 signed zones.  [RT #35120]

3658.	[port]		linux: Address platform specific compilation issue
			when libcap-devel is installed. [RT #34838]
   2013-11-07 05:20:33 by Takahiro Kambe | Files touched by this commit (2)
Log message:
Update bind96 to 9.6.3.1.ESV.10pl1 (BIND 9.6-ESV-R10-P1).

Security Fixes

   Treat an all zero netmask as invalid when generating the localnets
   acl. A Winsock library call on some Windows systems can return
   an incorrect value for an interface's netmask, potentially causing
   unexpected matches to BIND's built-in "localnets" Access Control
   List. (CVE-2013-6230) [RT #34687]
   2013-09-21 17:57:50 by Takahiro Kambe | Files touched by this commit (5) | Package updated
Log message:
Update bind96 to bind-9.6.3.1.ESV.10 (BIND 9.6-ESV-R10).
(CVE-2013-3919 is already fixed in pkgsrc).

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

Feature Changes

   rndc status now also shows the build-id. [RT #20422]

   Improved OPT pseudo-record processing to make it easier to support
   new EDNS options. [RT #34414]

   "configure" now finishes by printing a summary of optional BIND
   features and whether they are active or inactive. ("configure
   --enable-full-report" increases the verbosity of the summary.)
   [RT #31777]

   Addressed compatibility issues with newer versions of Microsoft
   Visual Studio. [RT #33916]

   Improved the 'rndc' man page. [RT #33506]

   'named -g' now no longer works with an invalid logging configuration.
   [RT #33473]

   The default (and minimum) value for tcp-listen-queue is now 10
   instead of 3.  This is a subtle control setting (not applicable
   to all OS environments).  When there is a high rate of inbound
   TCP connections, it controls how many connections can be queued
   before they are accepted by named.  Once this limit is exceeded,
   new TCP connections will be rejected.  Note however that a value
   of 10 does not imply a strict limit of 10 queued TCP connections
   - the impact of changing this configuration setting will be
   OS-dependent.  Larger values for tcp-listen queue will permit
   more pending tcp connections, which may be needed where there
   is a high rate of TCP-based traffic (for example in a dynamic
   environment where there are frequent zone updates and transfers).
   For most production servers the new default value of 10 should
   be adequate.  [RT #33029]

Bug Fixes

   Fixed the "allow-query-on" option to correctly check the destination
   address. [RT #34590]

   Fix forwarding for forward only "zones" beneath automatic empty
   zones. [RT #34583]

   Remove bogus warning log message about missing signatures when
   receiving a query for a SIG record. [RT #34600]

   Improved resistance to a theoretical authentication attack based
   on differential timing.  [RT #33939]

   The build of BIND now installs isc/stat.h so that it's available
   to /isc/file.h when building other applications that reference
   these header files - for example dnsperf (see Debian bug ticket
   #692467).  [RT #33056]

   Better handle failures building XML for stats channel responses.
   [RT #33706]

   Fixed a memory leak in GSS-API processing. [RT #33574]

   Fixed an acache-related race condition that could cause a crash.
   [RT #33602]

   rndc now properly fails when given an invalid '-c' argument. [RT
   #33571]

   Fixed an issue with the handling of zero TTL records that could
   cause improper SERVFAILs. [RT #33411]

   Fixed a crash-on-shutdown race condition with DNSSEC validation.
   [RT #33573]
   2013-07-12 12:45:05 by Jonathan Perkin | Files touched by this commit (181)
Log message:
Bump PKGREVISION of all packages which create users, to pick up change of
sysutils/user_* packages.
   2013-06-06 04:57:58 by Takahiro Kambe | Files touched by this commit (2)
Log message:
Update bind96 to 9.6.3.1.ESV.9pl1 (BIND 9.6-ESV-R9-P1).
Please refer CHANGES file for complete changes and here is quote from
release announce.

Introduction

   BIND 9.6-ESV-R9-P1 is the latest production release of BIND 9.6-ESV.

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized. [CVE-2012-3817]
   [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process. [CVE-2012-1667] [RT #29644]

New Features

   Adds a new configuration option, "check-spf"; valid values are
   "warn" (default) and "ignore".  When set to \ 
"warn", checks SPF
   and TXT records in spf format, warning if either resource record
   type occurs without a corresponding record of the other resource
   record type.  [RT #33355]

   Adds support for Uniform Resource Identifier (URI) resource
   records. [RT #23386]

   Adds support for Host Identity Protocol (HIP) resource records
   [RT #19384]

   Adds support for the EUI48 and EUI64 RR types. [RT #33082]

   Adds support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]

   The contributed queryperf utility has been improved, now retaining
   better round trip time statistics. [RT #30128]

Next | Query returned 56 messages, browsing 1 to 10 | Previous