./net/bind97, Version 9.7 of the Berkeley Internet Name Daemon, implementation of DNS

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2012Q3, Version: 9.7.7, Package name: bind-9.7.7, Maintainer: pkgsrc-users

BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:

- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self

This package contains the BIND 9.7 release.


Required to build:
[devel/libtool-base] [lang/perl5]

Package options: inet6, threads

Master sites: (Expand)

SHA1: 7dc47100e771fbcccf910d6e0a972fc5a95d431c
RMD160: 4368b107f139b0d34a5692d587bb8baeede2b6c9
Filesize: 6825.713 KB

Version history: (Expand)


CVS history: (Expand)


   2012-10-10 14:54:07 by Matthias Scheler | Files touched by this commit (2) | Package updated
Log message:
Pullup ticket #3942 - requested by taca
net/bind97: security update

Revisions pulled up:
- net/bind97/Makefile                                           1.20-1.21
- net/bind97/distinfo                                           1.17

---
   Module Name:	pkgsrc
   Committed By:	wiz
   Date:		Wed Oct  3 21:59:10 UTC 2012

   Modified Files:
   	pkgsrc/net/bind97: Makefile

   Log message:
   Bump all packages that use perl, or depend on a p5-* package, or
   are called p5-*.

   I hope that's all of them.

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Wed Oct 10 03:05:52 UTC 2012

   Modified Files:
   	pkgsrc/net/bind97: Makefile distinfo

   Log message:
   Update bind97 to 9.7.7 (BIND 9.7.7).

   Here are change changes from release note.  Note security fixes except
   CVE-2012-5166 should be already fixed in previous version of bind97 package.

   Please refer https://kb.isc.org/article/AA-00796 for list of full bug fixes.

   Security Fixes

   * A deliberately constructed combination of records could cause named to hang
     while populating the additional section of a response. [CVE-2012-5166] [RT
     #31090]
   * Prevents a named assert (crash) when queried for a record whose RDATA
     exceeds 65535 bytes [CVE-2012-4244] [RT #30416]
   * Prevents a named assert (crash) when validating caused by using "Bad \ 
cache"
     data before it has been initialized. [CVE-2012-3817] [RT #30025]
   * A condition has been corrected where improper handling of zero-length RDATA
     could cause undesirable behavior, including termination of the named
     process. [CVE-2012-1667] [RT #29644]

   New Features

     None

   Feature Changes

   * Improves OpenSSL error logging [RT #29932]
   * nslookup now returns a nonzero exit code when it is unable to get an answer.
     [RT #29492]