Commit Graph

24 Commits

Author SHA1 Message Date
Zoltan HERPAI
2f28404a93 bind: bring back PKG_MD5SUM for CC
Signed-off-by: Zoltan HERPAI <wigyori@uid0.hu>
2017-12-06 21:23:26 +01:00
Philip Prindeville
bc8a2ff329 bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-11-19 17:36:53 +01:00
Noah Meyerhans
ed10cd0c39 bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:34:15 +01:00
Sami Olmari
e2cd2f2b3c bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-11-19 17:34:05 +01:00
Noah Meyerhans
f648f3766f bind: Update to bind-9.10.5
This change includes fixes for several security issues:

  * CVE-2017-3138: rndc "" could trigger an assertion failure in named.
  * CVE-2017-3137: Some chaining (i.e., type CNAME or DNAME) responses to
    upstream queries could trigger assertion failures.
  * CVE-2017-3136: dns64 with break-dnssec yes; can result in an assertion
    failure.
  * CVE-2017-3135: If a server is configured with a response policy zone
    (RPZ) that rewrites an answer with local data, and is also configured
    for DNS64 address mapping, a NULL pointer can be read triggering a
    server crash.
  * CVE-2016-9444: named could mishandle authority sections with missing
    RRSIGs, triggering an assertion failure.
  * CVE-2016-9131: named mishandled some responses where covering RRSIG
    records were returned without the requested data, resulting in an
    assertion failure.
  * CVE-2016-9131: named incorrectly tried to cache TKEY records which could
    trigger an assertion failure when there was a class mismatch.
  * CVE-2016-8864: It was possible to trigger assertions when processing
    responses containing answers of type DNAME.
  * CVE-2016-6170: Added the ability to specify the maximum number of
    records permitted in a zone (max-records #;). This provides a mechanism
    to block overly large zone transfers, which is a potential risk with
    slave zones from other parties.
  * CVE-2016-2776: It was possible to trigger an assertion when rendering a
    message using a specially crafted request.
  * CVE-2016-2775: Calling getrrsetbyname() with a non absolute name could
    trigger an infinite recursion bug in lwresd or named with lwres
    configured if, when combined with a search list entry from resolv.conf,
    the resulting name is too long.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:49 +01:00
Noah Meyerhans
556c80b16f bind: update to bind-9.10.4-P5
This change fixes multiple denial-of-service vulnerabilities:
 * CVE-2016-9131: A malformed response to an ANY query can cause an
   assertion failure during recursion
 * CVE-2016-9147: An error handling a query response containing
   inconsistent DNSSEC information could cause an assertion failure
 * CVE-2016-9444: An unusually-formed DS record response could cause
   an assertion failure
 * CVE-2016-9778: An error handling certain queries using the
   nxdomain-redirect feature could cause a REQUIRE assertion failure
   in db.c

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:33:33 +01:00
Stijn Tintel
bd048aabb8 bind: disable libjson support
If libjson-c is detected during bind-libs configure phase, bind-libs
will be built with libjson support. This results in a missing dependency
error during install phase. Solve this by disabling libjson support.
2017-11-19 17:32:03 +01:00
Noah Meyerhans
cc6555e1d9 bind: set sysconfdir to /etc/bind
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-19 17:31:47 +01:00
Noah Meyerhans
6f06eb2e70 bind: update to 9.10.4-p4
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 21:00:41 +01:00
Noah Meyerhans
374eea23e2 bind: Set PKG_USE_MIPS16:=0 2017-11-09 21:00:25 +01:00
Noah Meyerhans
c2b892b145 bind: Update to 9.9.9-p3 for CVE-2016-2776
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 21:00:13 +01:00
Zoltan HERPAI
61df1559b8 net/bind: PKG_RELEASE increased
Signed-off-by: DonkZZ <donk@evhr.net>
2017-11-09 20:59:27 +01:00
DonkZZ
41a87a5ce5 net/bind: Update db.root
The contents of the file "db.root" is very old (12 years).
Here's a new version downloaded from ftp://ftp.internic.net/domain/

Signed-off-by: DonkZZ <donk@evhr.net>
2017-11-09 20:58:03 +01:00
DonkZZ
3497b7239d net/bind: Little cleaning in named.init
The variable "config_file" appears twice.

Signed-off-by: DonkZZ donk@evhr.net
2017-11-09 20:57:55 +01:00
Noah Meyerhans
fae7df9e66 bind: Update to 9.9.8-P4 to resolve CVE-2016-1285 and CVE-2016-1286
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-11-09 20:57:38 +01:00
Noah Meyerhans
41dcf83e53 bind: upgrade to 9.9.8-P3
Fixes:
 * CVE-2015-8704
 * CVE-2015-3193
 * CVE-2015-8000
 * CVE-2015-8461

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2016-01-24 12:43:29 +01:00
Noah Meyerhans
ffda9cc9c7 [bind] Update to 9.9.7-P3 to fix CVE-2015-5722 and CVE-2015-5986
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2015-09-03 14:03:41 +02:00
Noah Meyerhans
4e3085cd05 bind: update to version 9.9.7-p2
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2015-09-03 14:03:31 +02:00
Lawrence D'Anna
4a02aa766f bind: build fix: remove autoconf AR cruft
This patch removes some autoconf goo which is causing bind to use the host's ar
instead the ar from the toolchain.  If they're both elf platforms this is fine,
but it's no good if host is darwin.

Signed-off-by: Lawrence D'Anna <larry@elder-gods.org>
2015-03-27 20:00:18 -07:00
Noah Meyerhans
1fe4160fc2 net/bind: add the bind user/group
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2014-12-13 13:08:50 -08:00
Noah Meyerhans
4548c6b9c8 bind: Update to 9.9.6-P1 to address security issues CVE-2014-8500
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2014-12-10 23:18:51 -08:00
Noah Meyerhans
d3d3f1e57b bind: Use procd in /etc/init.d/named
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2014-12-06 14:11:10 -08:00
Noah Meyerhans
8a323adda7 net/bind: Update to upstream long-term-support release 9.9.5-P1
Update maintainer and license metadata in Makefile.
Signed-off-by: Noah Meyerhans <noahm@debian.org>
2014-08-16 14:51:54 -07:00
Noah Meyerhans
0719636b05 net/bind: Re-import package net/bind from oldpackages.
Signed-off-by: Noah Meyerhans <noahm@debian.org>
2014-08-16 14:51:54 -07:00