summaryrefslogtreecommitdiff
path: root/net/bind911
diff options
context:
space:
mode:
authortaca <taca@pkgsrc.org>2021-04-29 05:54:13 +0000
committertaca <taca@pkgsrc.org>2021-04-29 05:54:13 +0000
commitc0485134f07ab1e075558d6a7a7ac8d196089ca0 (patch)
tree1551bb7eccb7142b0a054e482fd3aedb470523c7 /net/bind911
parentb68148ffce749e57c8353bebc4c16d0e5663afc4 (diff)
downloadpkgsrc-c0485134f07ab1e075558d6a7a7ac8d196089ca0.tar.gz
net/bind911: update to 9.11.31
Security release. --- 9.11.31 released --- 5621. [bug] Due to a backporting mistake in change 5609, named binaries built against a Kerberos/GSSAPI library whose header files did not define the GSS_SPNEGO_MECHANISM preprocessor macro were not able to start if their configuration included the "tkey-gssapi-credential" option. This has been fixed. [GL #2634] --- 9.11.30 released --- 5617. [security] A specially crafted GSS-TSIG query could cause a buffer overflow in the ISC implementation of SPNEGO. (CVE-2021-25216) [GL #2604] 5616. [security] named crashed when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query. (CVE-2021-25215) [GL #2540] 5615. [security] Insufficient IXFR checks could result in named serving a zone without an SOA record at the apex, leading to a RUNTIME_CHECK assertion failure when the zone was subsequently refreshed. This has been fixed by adding an owner name check for all SOA records which are included in a zone transfer. (CVE-2021-25214) [GL #2467] 5614. [bug] Ensure all resources are properly cleaned up when a call to gss_accept_sec_context() fails. [GL #2620] 5609. [func] The ISC implementation of SPNEGO was removed from BIND 9 source code. It was no longer necessary as all major contemporary Kerberos/GSSAPI libraries include support for SPNEGO. [GL #2607]
Diffstat (limited to 'net/bind911')
-rw-r--r--net/bind911/Makefile5
-rw-r--r--net/bind911/distinfo10
2 files changed, 7 insertions, 8 deletions
diff --git a/net/bind911/Makefile b/net/bind911/Makefile
index 5c11478a1b9..16fbe6e3650 100644
--- a/net/bind911/Makefile
+++ b/net/bind911/Makefile
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.41 2021/04/21 11:42:22 adam Exp $
+# $NetBSD: Makefile,v 1.42 2021/04/29 05:54:13 taca Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
-PKGREVISION= 1
CATEGORIES= net
MASTER_SITES= https://downloads.isc.org/isc/bind9/${BIND_VERSION}/
@@ -15,7 +14,7 @@ CONFLICTS+= host-[0-9]*
MAKE_JOBS_SAFE= no
-BIND_VERSION= 9.11.29
+BIND_VERSION= 9.11.31
.include "../../mk/bsd.prefs.mk"
diff --git a/net/bind911/distinfo b/net/bind911/distinfo
index 5721b8f4687..8256df5ef96 100644
--- a/net/bind911/distinfo
+++ b/net/bind911/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.29 2021/03/21 04:08:44 taca Exp $
+$NetBSD: distinfo,v 1.30 2021/04/29 05:54:13 taca Exp $
-SHA1 (bind-9.11.29.tar.gz) = 333e951bb804c066976553ac52d5dd0a25364a9a
-RMD160 (bind-9.11.29.tar.gz) = 764f59628dc2c8a07c796e64da329d89723a2e45
-SHA512 (bind-9.11.29.tar.gz) = a4d9706ae10a39ebbfe9686c8a3c9c89dccb243a637f19fb3198b660996d65fb73bc90174f7d0b55fdec4f2ed435cc5d12544236e1ea471252232e92b2aabc9c
-Size (bind-9.11.29.tar.gz) = 8297010 bytes
+SHA1 (bind-9.11.31.tar.gz) = 84b392d929ab26b240a0d94f0655ba35b7e35da5
+RMD160 (bind-9.11.31.tar.gz) = e311dd23b02acc48d665052ba2057bdf1d622ef8
+SHA512 (bind-9.11.31.tar.gz) = 791adcb382b0cc6767dedccd0cbdbc48b5d32507c569f672397c9f2de59241433c39027cc3099957fea0885e1bc8db882cf83ae27fe0127d543cec8fc2e89f04
+Size (bind-9.11.31.tar.gz) = 8296079 bytes
SHA1 (patch-bin_named_Makefile.in) = 3e5b98e3e0bdb701be679d3580d6d2d7609d655b
SHA1 (patch-bin_named_server.c) = 0294d74eb3039049c4672a3de6eb371407bb382d
SHA1 (patch-bin_pkcs11_pkcs11-keygen.c) = ca2671a5e3216a08a212cf893e070b01705ef9ee