FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us

Please give me your LTO-4 or better tape library and I'll put it to good use.
found something from the cache
non port: head/dns/bind99/distinfo

Number of commits found: 32

Wed, 18 Feb 2015
[ 22:37 mat ] Original commit 
379326 dns/bind910/Makefile
379326 dns/bind910/distinfo
379326 dns/bind910/files/patch-CVE-2015-1349
379326 dns/bind99/Makefile
379326 dns/bind99/distinfo
379326 dns/bind99/files/patch-CVE-2015-1349
Update BIND 9.9 and 9.10 to the latest security patch.

Sponsored by:	Absolight
Mon, 8 Dec 2014
[ 17:29 mat ] Original commit 
374305 dns/bind-tools/Makefile
374305 dns/bind910/Makefile
374305 dns/bind910/distinfo
374305 dns/bind910/pkg-plist
374305 dns/bind99/Makefile
374305 dns/bind99/distinfo
374305 dns/bind99/pkg-plist
Security update of BIND9 to 9.9.6-P1 and 9.10.1-P1.

Security:	CVE-2014-8500 CVE-2014-8680
Sponsored by:	Absolight
Tue, 23 Sep 2014
[ 13:25 mat ] Original commit 
369056 dns/bind99/Makefile
369056 dns/bind99/distinfo
369056 dns/bind99/files/
369056 dns/bind99/files/
369056 dns/bind99/files/
369056 dns/bind99/files/patch-configure
369056 dns/bind99/pkg-plist
Update to 9.9.6.

Sponsored by:	Absolight
Thu, 12 Jun 2014
[ 14:18 mat ] Original commit 
357597 dns/bind99/Makefile
357597 dns/bind99/distinfo
Update to 9.9.5-P1.

Sponsored by:	Absolight
Fri, 7 Feb 2014
[ 09:15 mat ] Original commit 
343205 dns/bind99/Makefile
343205 dns/bind99/distinfo
Add back the RPZ speed improvements patch.

Many thanks to:	Vernon Schryver
Sponsored by:	Absolight
Fri, 31 Jan 2014
[ 08:58 mat ] Original commit 
341947 dns/bind99/Makefile
341947 dns/bind99/distinfo
341947 dns/bind99/pkg-plist
Update to 9.9.5.

Sponsored by:	Absolight
Mon, 13 Jan 2014
[ 17:38 mat ] Original commit 
339612 dns/bind96/Makefile
339612 dns/bind96/distinfo
339612 dns/bind98/Makefile
339612 dns/bind98/distinfo
339612 dns/bind99/Makefile
339612 dns/bind99/distinfo
339612 security/vuxml/vuln.xml
Security update to fix CVE-2014-0591 as reported at

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
Fri, 20 Sep 2013
[ 08:22 erwin ] Original commit 
327668 dns/bind99/Makefile
327668 dns/bind99/distinfo
327668 dns/bind99/pkg-plist
Update to 9.9.4

Note that the Rate Limiting option has been renamed.

Security Fixes

   Previously an error in bounds checking on the private type
   'keydata' could be used to deny service through a deliberately
   triggerable REQUIRE failure (CVE-2013-4854).  [RT #34238]

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

New Features
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 27 Jul 2013
[ 21:08 roberto ] Original commit 
323808 dns/bind98/Makefile
323808 dns/bind98/distinfo
323808 dns/bind99/Makefile
323808 dns/bind99/distinfo
Update the RPZ+RL patches for both versions.

Approved by:	erwin
Fri, 26 Jul 2013
[ 22:19 roberto ] Original commit 
323758 dns/bind98/distinfo
323758 dns/bind99/distinfo
Put back the two patches for RPZ-RL that were removed during the previous
[ 22:05 roberto ] Original commit 
323757 dns/bind98/Makefile
323757 dns/bind98/distinfo
323757 dns/bind99/Makefile
323757 dns/bind99/distinfo
Security update to fix CVE-2013-4854 as reported at

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
Wed, 5 Jun 2013
[ 11:51 erwin ] Original commit 
319984 dns/bind99/Makefile
319984 dns/bind99/distinfo
Update to 9.9.3-P1

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 31 May 2013
[ 09:49 erwin ] Original commit 
319476 dns/bind99/Makefile
319476 dns/bind99/distinfo
319476 dns/bind99/pkg-plist
Update to 9.9.3
[ 08:10 erwin ] Original commit 
319468 dns/bind98/Makefile
319468 dns/bind98/distinfo
319468 dns/bind99/Makefile
319468 dns/bind99/distinfo
Update RPZ and RRL patch set:

  - address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
Wed, 17 Apr 2013
[ 07:57 erwin ] Original commit 
315942 dns/bind98/Makefile
315942 dns/bind98/distinfo
315942 dns/bind99/Makefile
315942 dns/bind99/distinfo
Update RPZ+RRL patchset to the latest version.

The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
Wed, 27 Mar 2013
[ 07:56 erwin ] Original commit 
315356 dns/bind99/Makefile
315356 dns/bind99/distinfo
Update to 9.9.2-P2

Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:       CVE-2013-2266
Fri, 15 Mar 2013
[ 14:47 erwin ] Original commit 
314305 dns/bind99/Makefile
314305 dns/bind99/distinfo
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <> [1],
		Vernon Schryver <> [2]
Tue, 5 Feb 2013
[ 09:34 erwin ] Original commit 
311683 dns/bind99/distinfo
Update RPZ+RRL patch to 028.23

A serious Multiple Zone Response Policy Zone (RPZ2)
Speed Improvement bug has been fixed.

`./configure --enable-rpz-nsip --enable-rpz-nsdname`
is now the default.

Responses affected by the all-per-second parameter
are always dropped. The slip value has no effect on them.

There are improved log messages for responses that are
dropped or "slipped," because they would require an
excessive identical referral.
Wed, 9 Jan 2013
[ 10:20 erwin ] Original commit 
310131 dns/bind98/Makefile
310131 dns/bind98/distinfo
310131 dns/bind99/Makefile
310131 dns/bind99/distinfo
Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same

More information:
Fri, 4 Jan 2013
[ 10:39 erwin ] Original commit 
309924 dns/bind98/Makefile
309924 dns/bind98/distinfo
309924 dns/bind99/Makefile
309924 dns/bind99/distinfo
Add experimental option for Response Rate Limiting patch.
Wed, 5 Dec 2012
[ 07:46 erwin ] Original commit 
308317 dns/bind98/Makefile
308317 dns/bind98/distinfo
308317 dns/bind99/Makefile
308317 dns/bind99/distinfo
308317 security/vuxml/vuln.xml
Update to the latest patch level from ISC:

  BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
Feature safe:	yes
Fri, 19 Oct 2012
[ 10:17 erwin ] Original commit 
306113 dns/bind99/Makefile
306113 dns/bind99/distinfo
306113 dns/bind99/pkg-plist
Update to 9.9.2

Feature safe:	yes
Wed, 10 Oct 2012
[ 11:54 erwin ] Original commit 
305645 dns/bind96/Makefile
305645 dns/bind96/distinfo
305645 dns/bind97/Makefile
305645 dns/bind97/distinfo
305645 dns/bind98/Makefile
305645 dns/bind98/distinfo
305645 dns/bind99/Makefile
305645 dns/bind99/distinfo
305645 security/vuxml/vuln.xml
Upgrade to the latest BIND patch level:

A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Wed, 19 Sep 2012
[ 03:46 dougb ] Original commit 
304476 dns/bind96/Makefile
304476 dns/bind96/distinfo
304476 dns/bind97/Makefile
304476 dns/bind97/distinfo
304476 dns/bind98/Makefile
304476 dns/bind98/distinfo
304476 dns/bind99/Makefile
304476 dns/bind99/distinfo
304476 security/vuxml/vuln.xml
Upgrade to the latest BIND patch level:

Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information:
Tue, 24 Jul 2012
[ 19:23 dougb ] Original commit 
301487 dns/bind96/Makefile
301487 dns/bind96/distinfo
301487 dns/bind97/Makefile
301487 dns/bind97/distinfo
301487 dns/bind98/Makefile
301487 dns/bind98/distinfo
301487 dns/bind99/Makefile
301487 dns/bind99/distinfo
301487 security/vuxml/vuln.xml
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
Mon, 4 Jun 2012
[ 21:51 dougb ] Original commit 
1.122 dns/bind96/Makefile
1.73 dns/bind96/distinfo
1.25 dns/bind97/Makefile
1.19 dns/bind97/distinfo
1.15 dns/bind98/Makefile
1.13 dns/bind98/distinfo
1.9 dns/bind99/Makefile
1.7 dns/bind99/distinfo
1.2724 security/vuxml/vuln.xml
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
Wed, 23 May 2012
[ 04:40 dougb ] Original commit 
1.8 dns/bind99/Makefile
1.6 dns/bind99/distinfo
1.3 dns/bind99/pkg-plist
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
Wed, 29 Feb 2012
[ 18:41 dougb ] Original commit 
1.5 dns/bind99/Makefile
1.5 dns/bind99/distinfo
Release version of 9.9.0. Code is identical to rc4.
Fri, 24 Feb 2012
[ 07:26 dougb ] Original commit 
1.4 dns/bind99/Makefile
1.4 dns/bind99/distinfo
Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer
Sun, 19 Feb 2012
[ 02:41 dougb ] Original commit 
1.3 dns/bind99/Makefile
1.3 dns/bind99/distinfo
Upgrade to 9.9.0rc3, various small bug fixes
Wed, 1 Feb 2012
[ 02:12 dougb ] Original commit 
1.2 dns/bind99/Makefile
1.2 dns/bind99/distinfo
Update to 9.9.0rc2, which addresses mostly in-line signing bugs
Sat, 28 Jan 2012
[ 05:28 dougb ] Original commit 
1.146 dns/Makefile
1.1 dns/bind99/Makefile
1.1 dns/bind99/distinfo
1.1 dns/bind99/pkg-descr
1.1 dns/bind99/pkg-plist
By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.

BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
        NXDOMAIN redirection
        Improved startup and reconfiguration time, especially with large
                numbers of authoritative zones
        New "inline-signing" option, allows named to sign zones completely
                transparently, including static zones
        Many other new features, especially for DNSSEC

See the CHANGES file for more information on features.

Number of commits found: 32

User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
How big is it?
The latest upgrade!

Enter Keywords:

Latest Vulnerabilities
gdk-pixbuf2Sep 04
bind910Sep 03
bind910Sep 03
bind99Sep 03
bind99Sep 03
chromiumSep 02
powerdnsSep 02
avidemuxSep 01
ffmpegSep 01
ffmpegSep 01
gstreamer1-libavSep 01
gstreamer1-libavSep 01
handbrakeSep 01
handbrakeSep 01
kodiSep 01

20 vulnerabilities affecting 59 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Deleted ports
Sanity Test Failures

NEW Graphs (Javascript)

Calculated hourly:
Port count 25198
Broken 183
Deprecated 34
Ignore 486
Forbidden 1
Restricted 205
Vulnerable 45
Expired 2
Set to expire 18
Interactive 0
new 24 hours 3
new 48 hours7
new 7 days30
new fortnight54
new month218

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.