2015-02-19 15:50:31 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
Remove bind96 which was EOL Feb, 2014.
|
2014-05-30 01:38:20 by Thomas Klausner | Files touched by this commit (3049) |
Log message:
Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
|
2014-03-11 15:05:19 by Jonathan Perkin | Files touched by this commit (350) |
Log message:
Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
|
2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568) |
Log message:
Recursive PKGREVISION bump for OpenSSL API version bump.
|
2014-02-02 08:55:46 by Takahiro Kambe | Files touched by this commit (4) |
Log message:
Update bind96 to 9.6.3.1.ESV.11 (BIND 9.6-ESV-R11).
Security fixes were already covered by 9.6.3.1.ESV.10pl2 and this is
the final release of 9.6.ESV.
Several bug fixes and clean up, please refer CHANGES file in detail.
|
2014-01-13 18:27:09 by Takahiro Kambe | Files touched by this commit (3) |
Log message:
Update bind96 to bind-9.6.3.1.ESV.10pl2 (BIND 9.6-ESV-R10-P2), security
fix for CVE-2014-0591.
--- 9.6-ESV-R10-P2 released ---
3693. [security] memcpy was incorrectly called with overlapping
ranges resulting in malformed names being generated
on some platforms. This could cause INSIST failures
when serving NSEC3 signed zones. [RT #35120]
3658. [port] linux: Address platform specific compilation issue
when libcap-devel is installed. [RT #34838]
|
2013-11-07 05:20:33 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
Update bind96 to 9.6.3.1.ESV.10pl1 (BIND 9.6-ESV-R10-P1).
Security Fixes
Treat an all zero netmask as invalid when generating the localnets
acl. A Winsock library call on some Windows systems can return
an incorrect value for an interface's netmask, potentially causing
unexpected matches to BIND's built-in "localnets" Access Control
List. (CVE-2013-6230) [RT #34687]
|
2013-09-21 17:57:50 by Takahiro Kambe | Files touched by this commit (5) | |
Log message:
Update bind96 to bind-9.6.3.1.ESV.10 (BIND 9.6-ESV-R10).
(CVE-2013-3919 is already fixed in pkgsrc).
Security Fixes
Prevents exploitation of a runtime_check which can crash named
when satisfying a recursive query for particular malformed zones.
(CVE-2013-3919) [RT #33690]
Feature Changes
rndc status now also shows the build-id. [RT #20422]
Improved OPT pseudo-record processing to make it easier to support
new EDNS options. [RT #34414]
"configure" now finishes by printing a summary of optional BIND
features and whether they are active or inactive. ("configure
--enable-full-report" increases the verbosity of the summary.)
[RT #31777]
Addressed compatibility issues with newer versions of Microsoft
Visual Studio. [RT #33916]
Improved the 'rndc' man page. [RT #33506]
'named -g' now no longer works with an invalid logging configuration.
[RT #33473]
The default (and minimum) value for tcp-listen-queue is now 10
instead of 3. This is a subtle control setting (not applicable
to all OS environments). When there is a high rate of inbound
TCP connections, it controls how many connections can be queued
before they are accepted by named. Once this limit is exceeded,
new TCP connections will be rejected. Note however that a value
of 10 does not imply a strict limit of 10 queued TCP connections
- the impact of changing this configuration setting will be
OS-dependent. Larger values for tcp-listen queue will permit
more pending tcp connections, which may be needed where there
is a high rate of TCP-based traffic (for example in a dynamic
environment where there are frequent zone updates and transfers).
For most production servers the new default value of 10 should
be adequate. [RT #33029]
Bug Fixes
Fixed the "allow-query-on" option to correctly check the destination
address. [RT #34590]
Fix forwarding for forward only "zones" beneath automatic empty
zones. [RT #34583]
Remove bogus warning log message about missing signatures when
receiving a query for a SIG record. [RT #34600]
Improved resistance to a theoretical authentication attack based
on differential timing. [RT #33939]
The build of BIND now installs isc/stat.h so that it's available
to /isc/file.h when building other applications that reference
these header files - for example dnsperf (see Debian bug ticket
#692467). [RT #33056]
Better handle failures building XML for stats channel responses.
[RT #33706]
Fixed a memory leak in GSS-API processing. [RT #33574]
Fixed an acache-related race condition that could cause a crash.
[RT #33602]
rndc now properly fails when given an invalid '-c' argument. [RT
#33571]
Fixed an issue with the handling of zero TTL records that could
cause improper SERVFAILs. [RT #33411]
Fixed a crash-on-shutdown race condition with DNSSEC validation.
[RT #33573]
|
2013-07-12 12:45:05 by Jonathan Perkin | Files touched by this commit (181) |
Log message:
Bump PKGREVISION of all packages which create users, to pick up change of
sysutils/user_* packages.
|
2013-06-06 04:57:58 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
Update bind96 to 9.6.3.1.ESV.9pl1 (BIND 9.6-ESV-R9-P1).
Please refer CHANGES file for complete changes and here is quote from
release announce.
Introduction
BIND 9.6-ESV-R9-P1 is the latest production release of BIND 9.6-ESV.
Security Fixes
Prevents exploitation of a runtime_check which can crash named
when satisfying a recursive query for particular malformed zones.
(CVE-2013-3919) [RT #33690]
Prevents a named assert (crash) when validating caused by using
"Bad cache" data before it has been initialized. [CVE-2012-3817]
[RT #30025]
A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process. [CVE-2012-1667] [RT #29644]
New Features
Adds a new configuration option, "check-spf"; valid values are
"warn" (default) and "ignore". When set to \
"warn", checks SPF
and TXT records in spf format, warning if either resource record
type occurs without a corresponding record of the other resource
record type. [RT #33355]
Adds support for Uniform Resource Identifier (URI) resource
records. [RT #23386]
Adds support for Host Identity Protocol (HIP) resource records
[RT #19384]
Adds support for the EUI48 and EUI64 RR types. [RT #33082]
Adds support for the RFC 6742 ILNP record types (NID, LP, L32,
and L64). [RT #31836]
The contributed queryperf utility has been improved, now retaining
better round trip time statistics. [RT #30128]
|