pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: [pkgsrc-2023Q1] pkgsrc/net/bind916
Module Name: pkgsrc
Committed By: bsiegert
Date: Mon Jun 26 09:34:36 UTC 2023
Modified Files:
pkgsrc/net/bind916 [pkgsrc-2023Q1]: Makefile distinfo options.mk
Log Message:
Pullup ticket #6763 - requested by taca
net/bind916: security fix
Revisions pulled up:
- net/bind916/Makefile 1.56-1.58
- net/bind916/distinfo 1.47-1.49
- net/bind916/options.mk 1.5
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Apr 24 13:45:10 UTC 2023
Modified Files:
pkgsrc/net/bind916: Makefile distinfo
Log Message:
net/bind916: update to 9.16.40
--- 9.16.40 released ---
6142. [bug] Reduce the number of dns_dnssec_verify calls made
determining if revoked keys needs to be removed from
the trust anchors. [GL #3981]
6138. [doc] Fix the DF-flag documentation on the outgoing
UDP packets. [GL #3710]
6132. [doc] Remove a dead link in the DNSSEC guide. [GL #3967]
6129. [cleanup] Value stored to 'source' during its initialization is
never read. [GL #3965]
6124. [bug] When changing from a NSEC3 capable DNSSEC algorithm to
an NSEC3 incapable DNSSEC algorithm using KASP the zone
could sometimes be incompletely signed. [GL #3937]
5741. [bug] Log files with "timestamp" suffixes could be left in
place after rolling, even if the number of preserved
log files exceeded the configured "versions" limit.
[GL #828] [GL #3959]
---
Module Name: pkgsrc
Committed By: taca
Date: Wed May 17 13:41:58 UTC 2023
Modified Files:
pkgsrc/net/bind916: Makefile distinfo
Log Message:
net/bind916: update to 9.16.41
--- 9.16.41 released ---
6157. [bug] When removing delegations in an OPTOUT range
empty-non-terminal NSEC3 records generated by
those delegations were not removed. [GL #4027]
---
Module Name: pkgsrc
Committed By: taca
Date: Wed Jun 21 14:40:43 UTC 2023
Modified Files:
pkgsrc/net/bind916: Makefile distinfo options.mk
Log Message:
net/bind916: update to 9.16.42
pkgsrc change: reduce pkglint warnings.
9.16.42 (2023-06-21)
Security release:
- CVE-2023-2828
- CVE-2023-2911
6192. [security] A query that prioritizes stale data over lookup
triggers a fetch to refresh the stale data in cache.
If the fetch is aborted for exceeding the recursion
quota, it was possible for 'named' to enter an infinite
callback loop and crash due to stack overflow. This has
been fixed. (CVE-2023-2911) [GL #4089]
6190. [security] Improve the overmem cleaning process to prevent the
cache going over the configured limit. (CVE-2023-2828)
[GL #4055]
6183. [bug] Fix a serve-stale bug where a delegation from cache
could be returned to the client. [GL #3950]
6173. [bug] Properly process extra "nameserver" lines in
resolv.conf otherwise the next line is not properly
processed. [GL #4066]
6169. [bug] named could crash when deleting inline-signing zones
with "rndc delzone". [GL #4054]
To generate a diff of this commit:
cvs rdiff -u -r1.54 -r1.54.2.1 pkgsrc/net/bind916/Makefile
cvs rdiff -u -r1.46 -r1.46.2.1 pkgsrc/net/bind916/distinfo
cvs rdiff -u -r1.4 -r1.4.20.1 pkgsrc/net/bind916/options.mk
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/net/bind916/Makefile
diff -u pkgsrc/net/bind916/Makefile:1.54 pkgsrc/net/bind916/Makefile:1.54.2.1
--- pkgsrc/net/bind916/Makefile:1.54 Fri Mar 17 13:54:19 2023
+++ pkgsrc/net/bind916/Makefile Mon Jun 26 09:34:36 2023
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.54 2023/03/17 13:54:19 taca Exp $
+# $NetBSD: Makefile,v 1.54.2.1 2023/06/26 09:34:36 bsiegert Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
@@ -15,7 +15,7 @@ CONFLICTS+= host-[0-9]*
MAKE_JOBS_SAFE= no
-BIND_VERSION= 9.16.39
+BIND_VERSION= 9.16.42
BUILD_DEFS+= BIND_DIR VARBASE
Index: pkgsrc/net/bind916/distinfo
diff -u pkgsrc/net/bind916/distinfo:1.46 pkgsrc/net/bind916/distinfo:1.46.2.1
--- pkgsrc/net/bind916/distinfo:1.46 Fri Mar 17 13:54:19 2023
+++ pkgsrc/net/bind916/distinfo Mon Jun 26 09:34:36 2023
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.46 2023/03/17 13:54:19 taca Exp $
+$NetBSD: distinfo,v 1.46.2.1 2023/06/26 09:34:36 bsiegert Exp $
-BLAKE2s (bind-9.16.39.tar.xz) = a4252557cf77d30d4d3629a4121d8021b35c404571c9be78b8be152bfb6f3eb4
-SHA512 (bind-9.16.39.tar.xz) = 6e2e30815222a289e94f6857fdb6b142558ca56ecf5f8291f843f8476da8e4011042f1dd2bed031e5d9924370ae0705ce5b3ea2ce10ae830f8980b669eb26328
-Size (bind-9.16.39.tar.xz) = 5120164 bytes
+BLAKE2s (bind-9.16.42.tar.xz) = aac597ba81beb6b82c17910d38a5fee3c383fcdbaf0d01b785ad186ec615990d
+SHA512 (bind-9.16.42.tar.xz) = cf29e72c9c979f3cf8ba0b17357fb09c37f1436a7f3a518f49ce4b4c682fb367dd3d8e71de6603c166c95a7c535a77a9f2a1393a59723294626acefebbc95fd6
+Size (bind-9.16.42.tar.xz) = 5123476 bytes
SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98
SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8
SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb
Index: pkgsrc/net/bind916/options.mk
diff -u pkgsrc/net/bind916/options.mk:1.4 pkgsrc/net/bind916/options.mk:1.4.20.1
--- pkgsrc/net/bind916/options.mk:1.4 Sat Dec 19 16:41:36 2020
+++ pkgsrc/net/bind916/options.mk Mon Jun 26 09:34:36 2023
@@ -1,4 +1,4 @@
-# $NetBSD: options.mk,v 1.4 2020/12/19 16:41:36 taca Exp $
+# $NetBSD: options.mk,v 1.4.20.1 2023/06/26 09:34:36 bsiegert Exp $
PKG_OPTIONS_VAR= PKG_OPTIONS.bind916
PKG_SUPPORTED_OPTIONS= bind-dig-sigchase bind-xml-statistics-server
@@ -13,10 +13,10 @@ PTHREAD_OPTS+= native
.include "../../mk/pthread.buildlink3.mk"
.if defined(PTHREAD_TYPE) && (${PTHREAD_TYPE} == "none") || \
- !empty(MACHINE_PLATFORM:MNetBSD-*-vax) || \
- !empty(MACHINE_PLATFORM:MNetBSD-*-sparc) || \
- !empty(MACHINE_PLATFORM:MNetBSD-*-sparc64) || \
- !empty(MACHINE_PLATFORM:MNetBSD-*-m68k)
+ ${MACHINE_PLATFORM:MNetBSD-*-vax} || \
+ ${MACHINE_PLATFORM:MNetBSD-*-sparc} || \
+ ${MACHINE_PLATFORM:MNetBSD-*-sparc64} || \
+ ${MACHINE_PLATFORM:MNetBSD-*-m68k}
# don't touch PKG_SUGGESTED_OPTIONS
.else
PKG_SUGGESTED_OPTIONS+= threads
Home |
Main Index |
Thread Index |
Old Index