aboutsummaryrefslogtreecommitdiff
path: root/net/bind
Commit message (Collapse)AuthorAge
* bind: disable lmdbStijn Tintel2017-08-24
| | | | | | | | | | | When building on hosts with lmdb installed, bind configure phase fails: configure: error: found lmdb include but not library. Solve this by disabling lmdb. Fixes #4748. Fixes: eab56b6bee5d ("bind: version update to 9.11.2") Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* bind: patch unneeded if openssl is build w/ deprecatedPhilip Prindeville2017-08-08
| | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* bind: fixes for openssl 1.1.0 thread compatibilityPhilip Prindeville2017-08-07
| | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* bind: version update to 9.11.2Philip Prindeville2017-08-07
| | | | | | Also refresh patches and dependencies. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* bind: Update to 9.10.5-P3Noah Meyerhans2017-07-16
| | | | | | | | | | | | | New upstream release includes fixes for the following security issues: * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could cause named to go into an infinite query loop * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone transfers or zone updates. * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone transfers or zone updates. Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Include dnssec-settime in bind-dnssec/toolSami Olmari2017-06-06
| | | | | | | | | | | | | | <net/bind> Maintainer: @nmeyerhans Compile tested: x86_64, OpenWRT 50107 Run tested: x86 / 64, OpenWRT 50107 Description: Added dnssec-settime into bind-dnssec and bind-tools Signed-off-by: Sami Olmari <sami+git@olmari.fi>
* bind: Update to bind-9.10.5Noah Meyerhans2017-05-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This change includes fixes for several security issues: * CVE-2017-3138: rndc "" could trigger an assertion failure in named. * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to upstream queries could trigger assertion failures. * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion failure. * CVE-2017-3135: If a server is configured with a response policy zone (RPZ) that rewrites an answer with local data, and is also configured for DNS64 address mapping, a NULL pointer can be read triggering a server crash. * CVE-2016-9444: named could mishandle authority sections with missing RRSIGs, triggering an assertion failure. * CVE-2016-9131: named mishandled some responses where covering RRSIG records were returned without the requested data, resulting in an assertion failure. * CVE-2016-9131: named incorrectly tried to cache TKEY records which could trigger an assertion failure when there was a class mismatch. * CVE-2016-8864: It was possible to trigger assertions when processing responses containing answers of type DNAME. * CVE-2016-6170: Added the ability to specify the maximum number of records permitted in a zone (max-records #;). This provides a mechanism to block overly large zone transfers, which is a potential risk with slave zones from other parties. * CVE-2016-2776: It was possible to trigger an assertion when rendering a message using a specially crafted request. * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could trigger an infinite recursion bug in lwresd or named with lwres configured if, when combined with a search list entry from resolv.conf, the resulting name is too long. Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: update to bind-9.10.4-P5Noah Meyerhans2017-01-11
| | | | | | | | | | | | | | | This change fixes multiple denial-of-service vulnerabilities: * CVE-2016-9131: A malformed response to an ANY query can cause an assertion failure during recursion * CVE-2016-9147: An error handling a query response containing inconsistent DNSSEC information could cause an assertion failure * CVE-2016-9444: An unusually-formed DS record response could cause an assertion failure * CVE-2016-9778: An error handling certain queries using the nxdomain-redirect feature could cause a REQUIRE assertion failure in db.c Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Enable filter-aaaa build-time option by default.Noah Meyerhans2017-01-08
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: disable libjson supportStijn Tintel2016-11-29
| | | | | | If libjson-c is detected during bind-libs configure phase, bind-libs will be built with libjson support. This results in a missing dependency error during install phase. Solve this by disabling libjson support.
* bind: set sysconfdir to /etc/bindNoah Meyerhans2016-11-17
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: update to 9.10.4-p4Noah Meyerhans2016-11-01
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Set PKG_USE_MIPS16:=0Noah Meyerhans2016-09-29
|
* bind: Update to 9.9.9-p3 for CVE-2016-2776Noah Meyerhans2016-09-27
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* packages: cleanup Makefile variablesStephen Walker2016-07-09
| | | | | | Standard assignment is immediate expansion without any extraneous spacing, RFC822 compliant email addresses without any quotation marks and long git hashes Signed-off-by: Stephen Walker <stephendwalker+github@gmail.com>
* net/bind: PKG_RELEASE increasedDonkZZ2016-03-20
| | | Signed-off-by: DonkZZ <donk@evhr.net>
* net/bind: Update db.rootDonkZZ2016-03-20
| | | | | | The contents of the file "db.root" is very old (12 years). Here's a new version downloaded from ftp://ftp.internic.net/domain/ Signed-off-by: DonkZZ <donk@evhr.net>
* net/bind: Little cleaning in named.initDonkZZ2016-03-20
| | | | | The variable "config_file" appears twice. Signed-off-by: DonkZZ donk@evhr.net
* bind: Update to 9.9.8-P4 to resolve CVE-2016-1285 and CVE-2016-1286Noah Meyerhans2016-03-09
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Allow packages to be built with optional filter-aaaa optionNoah Meyerhans2016-01-23
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: upgrade to 9.9.8-P3Noah Meyerhans2016-01-23
| | | | | | | | | | Fixes: * CVE-2015-8704 * CVE-2015-3193 * CVE-2015-8000 * CVE-2015-8461 Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* Merge pull request #1722 from rraptorr/bind-ecdsaNoah Meyerhans2015-09-04
|\ | | | | bind: Enable ECDSA support
| * bind: Enable ECDSA supportJanusz Dziemidowicz2015-08-27
| | | | | | | | | | | | | | Enables bind to do ECDSA DNSSEC validation. Depends on OpenSSL support for ECDSA. Increases size of bind-libs package by about 2kB. Signed-off-by: Janusz Dziemidowicz <rraptorr@nails.eu.org>
* | [bind] Update to 9.9.7-P3 to fix CVE-2015-5722 and CVE-2015-5986Noah Meyerhans2015-09-02
|/ | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: update to version 9.9.7-p2Noah Meyerhans2015-08-14
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: build fix: remove autoconf AR cruftLawrence D'Anna2015-03-27
| | | | | | | | This patch removes some autoconf goo which is causing bind to use the host's ar instead the ar from the toolchain. If they're both elf platforms this is fine, but it's no good if host is darwin. Signed-off-by: Lawrence D'Anna <larry@elder-gods.org>
* net/bind: add the bind user/groupNoah Meyerhans2014-12-13
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Update to 9.9.6-P1 to address security issues CVE-2014-8500Noah Meyerhans2014-12-10
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* bind: Use procd in /etc/init.d/namedNoah Meyerhans2014-12-06
| | | | Signed-off-by: Noah Meyerhans <frodo@morgul.net>
* net/bind: Update to upstream long-term-support release 9.9.5-P1Noah Meyerhans2014-08-16
| | | | | Update maintainer and license metadata in Makefile. Signed-off-by: Noah Meyerhans <noahm@debian.org>
* net/bind: Re-import package net/bind from oldpackages.Noah Meyerhans2014-08-16
Signed-off-by: Noah Meyerhans <noahm@debian.org>