Commit Graph

20 Commits

Author SHA1 Message Date
Zoltan HERPAI 2f28404a93 bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-12-06 21:23:26 +01:00
Philip Prindeville bc8a2ff329 bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-11-19 17:36:53 +01:00
Noah Meyerhans ed10cd0c39 bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:34:15 +01:00
Sami Olmari e2cd2f2b3c bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-11-19 17:34:05 +01:00
Noah Meyerhans f648f3766f bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:49 +01:00
Noah Meyerhans 556c80b16f bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:33 +01:00
Stijn Tintel bd048aabb8 bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
2017-11-19 17:32:03 +01:00
Noah Meyerhans cc6555e1d9 bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:31:47 +01:00
Noah Meyerhans 6f06eb2e70 bind: update to 9.10.4-p4
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 21:00:41 +01:00
Noah Meyerhans 374eea23e2 bind: Set PKG_USE_MIPS16:=0 2017-11-09 21:00:25 +01:00
Noah Meyerhans c2b892b145 bind: Update to 9.9.9-p3 for CVE-2016-2776
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 21:00:13 +01:00
Zoltan HERPAI 61df1559b8 net/bind: PKG_RELEASE increased
Signed-off-by: DonkZZ <donk@evhr.net>
2017-11-09 20:59:27 +01:00
Noah Meyerhans fae7df9e66 bind: Update to 9.9.8-P4 to resolve CVE-2016-1285 and CVE-2016-1286
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 20:57:38 +01:00
Noah Meyerhans 41dcf83e53 bind: upgrade to 9.9.8-P3
Fixes:
 * CVE-2015-8704
 * CVE-2015-3193
 * CVE-2015-8000
 * CVE-2015-8461

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2016-01-24 12:43:29 +01:00
Noah Meyerhans ffda9cc9c7 [bind] Update to 9.9.7-P3 to fix CVE-2015-5722 and CVE-2015-5986
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2015-09-03 14:03:41 +02:00
Noah Meyerhans 4e3085cd05 bind: update to version 9.9.7-p2
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2015-09-03 14:03:31 +02:00
Noah Meyerhans 1fe4160fc2 net/bind: add the bind user/group
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2014-12-13 13:08:50 -08:00
Noah Meyerhans 4548c6b9c8 bind: Update to 9.9.6-P1 to address security issues CVE-2014-8500
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2014-12-10 23:18:51 -08:00
Noah Meyerhans 8a323adda7 net/bind: Update to upstream long-term-support release 9.9.5-P1
Update maintainer and license metadata in Makefile.
Signed-off-by: Noah Meyerhans <noahm@debian.org>
2014-08-16 14:51:54 -07:00
Noah Meyerhans 0719636b05 net/bind: Re-import package net/bind from oldpackages.
Signed-off-by: Noah Meyerhans <noahm@debian.org>
2014-08-16 14:51:54 -07:00