non port: dns/bind99/distinfo |
Number of commits found: 56 |
Monday, 19 Mar 2018
|
11:21 mat
Update BIND9 ports to 9.9.12, 9.10.7, 9.11.3 and 9.12.1.
Sponsored by: Absolight
 |
Wednesday, 17 Jan 2018
|
07:59 mat
Update BIND9* to 9.9.11-P1, 9.10.6-P1, 9.11.2-P1 and 9.12.0rc3
MFH: 2018Q1
Security: CVE-2017-3145
Sponsored by: Absolight
 |
Friday, 28 Jul 2017
|
22:57 mat
Update BIND9 ports to 9.{9.11,10.6,11.2}.
Sponsored by: Absolight
 |
Monday, 10 Jul 2017
|
18:48 mat
Update to 9.{9.10,10.5,11.1}-P3.
Sponsored by: Absolight
 |
Thursday, 29 Jun 2017
|
20:51 mat
Update to 9.{9.10,10.5,11.1}-P2.
Security: CVE-2017-3142
Security: CVE-2017-3143
Sponsored by: Absolight
 |
Wednesday, 14 Jun 2017
|
22:54 mat
Update to 9.9.10-P1, 9.10.5-P1, 9.11.1-P1.
MFH: 2017Q2
Security: CVE-2017-3140
Security: CVE-2017-3141
Sponsored by: Absolight
 |
Thursday, 20 Apr 2017
|
13:12 mat
Update to 9.9.10, 9.10.5, 9.11.1 and 9.12 to latest snapshot.
While there:
Make it more maintainable by sorting stuff in the Makefile and removing
vestigial pre 10.3 things.
Refresh the root zone hints.
"Fix" the configuration section telling you to get some top level
zones from f.root-servers.net, which does not allow axfr any more. [1]
PR: 218656 [1]
Reported by: Thomas Steen Rasmussen / Tykling [1]
MFH: 2017Q2
Sponsored by: Absolight
 |
Thursday, 13 Apr 2017
|
04:21 delphij
Security update to 9.9.9-P8.
Security: c6861494-1ffb-11e7-934d-d05099c0ae8c
Approved by: so
 |
Wednesday, 8 Feb 2017
|
22:39 mat
Update to 9.9.9-P6, 9.10.4-P6 and 9.11.0-P3.
While there, remove the RPZ_PATCH for BIND9 9.9, it has not been updated
for years, and, it does not build any more.
MFH: 2017Q1
Security: CVE-2017-3135
Sponsored by: Absolight
 |
Thursday, 12 Jan 2017
|
07:28 delphij
Security update to 9.9.5-P5.
Approved by: so
Security: d4c7e9a9-d893-11e6-9b4d-d050996490d0
MFH: 2017Q1
 |
Wednesday, 2 Nov 2016
|
06:38 delphij
Security update:
dns/bind99: 9.9.9-P3 -> 9.9.9-P4
dns/bind910: 9.10.4-P3 -> 9.10.4-P4
dns/bind911: 9.11.0 -> 9.11.0-P1
Security: CVE-2016-8864
Submitted by: mat
MFH: 2016Q4
 |
Tuesday, 27 Sep 2016
|
16:10 mat
Update BIND9 to latest versions, 9.9.9-P3, 9.10.4-P3, 9.11.0rc3
MFH: 2016Q3
Security: CVE-2016-2776
Sponsored by: Absolight
 |
Tuesday, 19 Jul 2016
|
12:11 mat
Add distfile missed in last commit.
 |
11:30 mat
BIND9 update, 9.9.9-P2, 9.10.4-P2, 9.11.0b2 and latest 9.12 snapshot.
MFH: 2016Q3
Security: CVE-2016-2775
Changes: https://lists.isc.org/pipermail/bind-announce/2016-July/000996.html
Changes: https://lists.isc.org/pipermail/bind-announce/2016-July/000997.html
Changes: https://lists.isc.org/pipermail/bind-announce/2016-July/000998.html
Changes: https://lists.isc.org/pipermail/bind-announce/2016-July/000999.html
Sponsored by: Absolight
 |
Thursday, 26 May 2016
|
08:54 mat
Update to 9.9.9-P1 and 9.10.4-P1.
Sponsored by: Absolight
 |
Friday, 29 Apr 2016
|
10:04 mat
Update to 9.9.9.
While there, update the root hints file.
Sponsored by: Absolight
 |
Wednesday, 9 Mar 2016
|
21:16 mat
Update to 9.9.8-P4, 9.10.3-P4 and latest snapshot.
MFH: 2016Q1 (obviously)
Security: CVE-2016-1285
Security: CVE-2016-1286
Security: CVE-2016-2088
Sponsored by: Absolight
 |
Tuesday, 19 Jan 2016
|
21:13 mat
Update bind99 to 9.9.8-P3, bind910 to 9.10.3-P3 and bind9-devel to
latest snapshot.
MFH: 2016Q1
Security: CVE-2015-8704
Security: CVE-2015-8705
Sponsored by: Absolight
 |
Wednesday, 16 Dec 2015
|
00:45 mat
Update BIND9 to the latest patch releases, 9.9.8-P2, 9.10.3-P2, and snapshot.
MFH: 2015Q4
Changes: https://kb.isc.org/article/AA-01326/81/BIND-9.9.8-P2-Release-Notes.html
Changes: https://kb.isc.org/article/AA-01328/81/BIND-9.10.3-P2-Release-Notes.html
Security: CVE-2015-3193
Security: CVE-2015-8000
Security: CVE-2015-8461
Sponsored by: Absolight
 |
Wednesday, 16 Sep 2015
|
08:12 mat
Update to bind99 to 9.9.8 & bind910 to 9.10.3.
- Add new QUERYTRACE & FETCHLIMIT.
Note that QUERYTRACE is for debug purposes, and will eat your
performances.
- Don't do the PORTREVISION patch if PORTREVISION is 0.
- Regen some patches
Changes: https://lists.isc.org/pipermail/bind-announce/2015-September/000961.html
Changes: https://lists.isc.org/pipermail/bind-announce/2015-September/000962.html
Sponsored by: Absolight
 |
Wednesday, 2 Sep 2015
|
20:46 mat
Update BIND to 9.9.7-P3 and 9.10.2-P4.
MFH: 2015Q3 (Also needs 393161 395660 395703)
Security: CVE-2015-5722, CVE-2015-5986
Sponsored by: Absolight
 |
Tuesday, 28 Jul 2015
|
22:21 mat
Update BIND9.
- 9.9 -> 9.9.7-P2
- 9.10 -> 9.10.2-P3
Security: CVE-2015-5477
Sponsored by: Absolight
 |
Tuesday, 7 Jul 2015
|
22:15 mat
Update BIND 9.9 to 9.9.7-P1 and 9.10 to 9.10.2-P2.
MFH: 2015Q3
Security: CVE-2015-4620
Sponsored by: Absolight
 |
Thursday, 26 Feb 2015
|
02:03 mat
Update dns/bind99 to 9.9.7 and dns/bind910 to 9.10.2.
On 8 and 9, use the same configuration path than on 10+, ${PREFIX}/etc/namedb/.
Sponsored by: Absolight
 |
Wednesday, 18 Feb 2015
|
22:37 mat
Update BIND 9.9 and 9.10 to the latest security patch.
Sponsored by: Absolight
 |
Monday, 8 Dec 2014
|
17:29 mat
Security update of BIND9 to 9.9.6-P1 and 9.10.1-P1.
Security: CVE-2014-8500 CVE-2014-8680
Sponsored by: Absolight
 |
Tuesday, 23 Sep 2014
|
13:25 mat
Update to 9.9.6.
Sponsored by: Absolight
 |
Thursday, 12 Jun 2014
|
14:18 mat
Update to 9.9.5-P1.
Changes: https://lists.isc.org/pipermail/bind-announce/2014-June/000913.html
Sponsored by: Absolight
 |
Friday, 7 Feb 2014
|
09:15 mat
Add back the RPZ speed improvements patch.
Many thanks to: Vernon Schryver
Sponsored by: Absolight
 |
Friday, 31 Jan 2014
|
08:58 mat
Update to 9.9.5.
Changes: https://lists.isc.org/pipermail/bind-announce/2014-January/000896.html
Sponsored by: Absolight
 |
Monday, 13 Jan 2014
|
17:38 mat
Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/
9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2
Security: CVE-2014-0591 Remote DOS
 |
Friday, 20 Sep 2013
|
08:22 erwin
Update to 9.9.4
Note that the Rate Limiting option has been renamed.
Security Fixes
Previously an error in bounds checking on the private type
'keydata' could be used to deny service through a deliberately
triggerable REQUIRE failure (CVE-2013-4854). [RT #34238]
Prevents exploitation of a runtime_check which can crash named
when satisfying a recursive query for particular malformed zones.
(CVE-2013-3919) [RT #33690]
New Features
Added Response Rate Limiting (RRL) functionality to reduce the
effectiveness of DNS as an amplifier for reflected denial-of-service
attacks by rate-limiting substantially-identical responses. [RT
#28130]
Feature Changes
rndc status now also shows the build-id. [RT #20422]
Improved OPT pseudo-record processing to make it easier to support
new EDNS options. [RT #34414]
"configure" now finishes by printing a summary of optional BIND
features and whether they are active or inactive. ("configure
--enable-full-report" increases the verbosity of the summary.)
[RT #31777]
Addressed compatibility issues with newer versions of Microsoft
Visual Studio. [RT #33916]
Improved the 'rndc' man page. [RT #33506]
'named -g' now no longer works with an invalid logging configuration.
[RT #33473]
The default (and minimum) value for tcp-listen-queue is now 10
instead of 3. This is a subtle control setting (not applicable
to all OS environments). When there is a high rate of inbound
TCP connections, it controls how many connections can be queued
before they are accepted by named. Once this limit is exceeded,
new TCP connections will be rejected. Note however that a value
of 10 does not imply a strict limit of 10 queued TCP connections
- the impact of changing this configuration setting will be
OS-dependent. Larger values for tcp-listen queue will permit
more pending tcp connections, which may be needed where there
is a high rate of TCP-based traffic (for example in a dynamic
environment where there are frequent zone updates and transfers).
For most production servers the new default value of 10 should
be adequate. [RT #33029]
Added support for OpenSSL versions 0.9.8y, 1.0.0k, and 1.0.1e
with PKCS#11. [RT #33463]
Added logging messages on slave servers when they forward DDNS
updates to a master. [RT #33240]
Changed the logging category for RRL events from 'queries' to
'query-errors'. [RT #33540]
 |
Saturday, 27 Jul 2013
|
21:08 roberto
Update the RPZ+RL patches for both versions.
Approved by: erwin
 |
Friday, 26 Jul 2013
|
22:19 roberto
Put back the two patches for RPZ-RL that were removed during the previous
update.
 |
22:05 roberto
Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0
9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2
9.6.x is not affected, neither is 10.x.
Security: CVE-2013-4854 Remote DOS
 |
Wednesday, 5 Jun 2013
|
11:51 erwin
Update to 9.9.3-P1
Security Fixes
Prevents exploitation of a runtime_check which can crash named
when satisfying a recursive query for particular malformed zones.
(CVE-2013-3919) [RT #33690]
Now supports NAPTR regular expression validation on all platforms,
and avoids memory exhaustion compiling pathological regular
expressions. (CVE-2013-2266) [RT #32688]
Prevents named from aborting with a require assertion failure
on servers with DNS64 enabled. These crashes might occur as a
result of specific queries that are received. (CVE-2012-5688)
[RT #30792 / #30996]
Prevents an assertion failure in named when RPZ and DNS64 are
used together. (CVE-2012-5689) [RT #32141]
See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00970/0/BIND-9.9.3-P1-Extended-Support-Version-Release-Notes.html
Security: CVE-2013-3919
CVE-2013-2266
CVE-2012-5688
CVE-2012-5689
 |
Friday, 31 May 2013
|
09:49 erwin
Update to 9.9.3
 |
08:10 erwin
Update RPZ and RRL patch set:
- address the issue raised by Bob Harold. RRL on recursive servers
applies rate limits after waiting for recursion except on
sub-domains of domains for which the server is authoritative.
- fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).
- move reports of RRL drop and slip actions from the "queries"
log category to the "query-errors" category. Because they are not
in the "queres" category, enabling or disabling query logging no
longer affects them.
 |
Wednesday, 17 Apr 2013
|
07:57 erwin
Update RPZ+RRL patchset to the latest version.
The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.
DNS RRL is not recommended for recursive servers.
Feature safe: yes
 |
Wednesday, 27 Mar 2013
|
07:56 erwin
Update to 9.9.2-P2
Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]
Security: CVE-2013-2266
 |
Friday, 15 Mar 2013
|
14:47 erwin
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]
Submitted by: Robert Sargent <robtsgt@gmail.com> [1],
Vernon Schryver <vjs@rhyolite.com> [2]
 |
Tuesday, 5 Feb 2013
|
09:34 erwin
Update RPZ+RRL patch to 028.23
A serious Multiple Zone Response Policy Zone (RPZ2)
Speed Improvement bug has been fixed.
`./configure --enable-rpz-nsip --enable-rpz-nsdname`
is now the default.
Responses affected by the all-per-second parameter
are always dropped. The slip value has no effect on them.
There are improved log messages for responses that are
dropped or "slipped," because they would require an
excessive identical referral.
 |
Wednesday, 9 Jan 2013
|
10:20 erwin
Update the response rate limiting patch to the latest
released version of January 5, 2013.
This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.
More information: http://ss.vix.su/~vjs/rrlrpz.html
 |
Friday, 4 Jan 2013
|
10:39 erwin
Add experimental option for Response Rate Limiting patch.
 |
Wednesday, 5 Dec 2012
|
07:46 erwin
Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
vulnerable to a software defect that allows a crafted query to
crash the server with a REQUIRE assertion failure. Remote
exploitation of this defect can be achieved without extensive
effort, resulting in a denial-of-service (DoS) vector against
affected servers.
Security: 2892a8e2-3d68-11e2-8e01-0800273fe665
CVE-2012-5688
Feature safe: yes
 |
Friday, 19 Oct 2012
|
10:17 erwin
Update to 9.9.2
Feature safe: yes
 |
Wednesday, 10 Oct 2012
|
11:54 erwin
Upgrade to the latest BIND patch level:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.
Security:
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
 |
Wednesday, 19 Sep 2012
|
03:46 dougb
Upgrade to the latest BIND patch level:
Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.
Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.
ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.
A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.
For more information: https://kb.isc.org/article/AA-00788
 |
Tuesday, 24 Jul 2012
|
19:23 dougb
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9
High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.
CVE: CVE-2012-3817
Posting date: 24 July, 2012
 |
Monday, 4 Jun 2012
|
21:51 dougb
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:
Processing of DNS resource records where the rdata field is zero length
may cause various issues for the servers handling them.
Processing of these records may lead to unexpected outcomes. Recursive
servers may crash or disclose some portion of memory to the client.
Secondary servers may crash on restart after transferring a zone
containing these records. Master servers may corrupt zone data if the
zone option "auto-dnssec" is set to "maintain". Other unexpected
problems that are not listed here may also be encountered.
All BIND users are strongly encouraged to upgrade.
 |
Wednesday, 23 May 2012
|
04:40 dougb
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:
Feature Change
* BIND now recognizes the TLSA resource record type, created to
support IETF DANE (DNS-based Authentication of Named Entities)
[RT #28989]
Bug Fix
* The locking strategy around the handling of iterative queries
has been tuned to reduce unnecessary contention in a multi-
threaded environment.
Each version also contains other critical bug fixes.
All BIND users are encouraged to upgrade to these latest versions.
 |
Wednesday, 29 Feb 2012
|
18:41 dougb
Release version of 9.9.0. Code is identical to rc4.
 |
Friday, 24 Feb 2012
|
07:26 dougb
Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer
 |
Sunday, 19 Feb 2012
|
02:41 dougb
Upgrade to 9.9.0rc3, various small bug fixes
 |
Wednesday, 1 Feb 2012
|
02:12 dougb
Update to 9.9.0rc2, which addresses mostly in-line signing bugs
 |
Saturday, 28 Jan 2012
|
05:28 dougb
By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.
BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
including:
NXDOMAIN redirection
Improved startup and reconfiguration time, especially with large
numbers of authoritative zones
New "inline-signing" option, allows named to sign zones completely
transparently, including static zones
Many other new features, especially for DNSSEC
See the CHANGES file for more information on features.
https://kb.isc.org/article/AA-00592
 |
Number of commits found: 56 |