68 Commits

Author SHA1 Message Date
sthen
605258dc87 update to BIND 9.10.5 2017-05-03 20:20:42 +00:00
sthen
3699ab4692 update to BIND 9.10.4-P8 (-P7 was withdrawn)
CVE-2017-3136: An error handling synthesized records could cause an
assertion failure when using DNS64 with "break-dnssec yes;"

CVE-2017-3137: A response packet can cause a resolver to terminate when
processing an answer containing a CNAME or DNAME

CVE-2017-3138: named exits with a REQUIRE assertion failure if it receives
a null command string on its control channel
2017-04-13 10:35:33 +00:00
sthen
b3152d3371 update to BIND 9.10.4-P6
* If a server is configured with a response policy zone (RPZ) that
rewrites an answer with local data, and is also configured for DNS64
address mapping, a NULL pointer can be read triggering a server crash.
This flaw is disclosed in CVE-2017-3135. [RT #44434]

* A synthesized CNAME record appearing in a response before the associated
DNAME could be cached, when it should not have been. This was a
regression introduced while addressing CVE-2016-8864. [RT #44318]
2017-02-09 00:04:40 +00:00
sthen
50473a77bb add pledges for dig/host/nslookup in the ports version of BIND. initial
pledge is "stdio rpath inet unix dns", dropping to "stdio inet dns"
after argument parsing.

access to resolv.conf is required late; the dns pledge is used for this
rather than requiring full rpath; however contrary to the version in
base, inet is allowed as well, so that it can be used as a debug tool
for servers on alternate ports.

works fine for me; no feedback after posting yet so committing to get
real-world testing. please report any issues.
2017-01-24 11:46:35 +00:00
sthen
59278df8ab SECURITY update to BIND 9.10.4-P5
Named could mishandle authority sections that were missing RRSIGs triggering
an assertion failure.  CVE-2016-9444

Named mishandled some responses where covering RRSIG records are returned
without the requested data resulting in a assertion failure.  CVE-2016-9147

Named incorrectly tried to cache TKEY records which could trigger an
assertion failure when there was a class mismatch.  CVE-2016-9131
2017-01-12 12:22:20 +00:00
sthen
773d2b6dc7 update to BIND 9.10.4-P1, fixing a resolver DoS in DNAME handling. CVE-2016-8864 2016-11-01 21:02:03 +00:00
sthen
fe29ebcaad update to BIND 9.10.4-P3, fixing
https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 (lwres only)
https://kb.isc.org/article/AA-01419/74/CVE-2016-2776 ("all servers if
they can receive request packets from any source")
2016-09-27 19:49:10 +00:00
naddy
2594c2979f replace libiconv module 2016-09-13 16:12:14 +00:00
sthen
2b012a1821 Update to BIND 9.10.4-P2, fixes CVE-2016-2775 ("getrrsetbyname with a non
absolute name could trigger an infinite recursion bug in lwres[..]"; affects
users of lwresd and users with "lwres" enabled in their configuration).
Also has a couple of regression fixes. OK naddy@
2016-07-19 10:46:15 +00:00
sthen
159edcc4ce update to BIND 9.10.4-P1, fixing a problem where adjacent bitfields
were protected by different locks.

See http://fanf.livejournal.com/144615.html for an informative write-up
on the issue: "Even the Deathstation 9000 can't screw up the BIND 9.10.4
fix".
2016-05-26 09:25:25 +00:00
sthen
7924de779f update to bind-9.10.4 2016-04-29 11:01:02 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
sthen
d5803c3bbe update to BIND 9.10.3-P4, fixes crashes (assertion failures), one present
since 9.0.0.  CVE-2016-1285 CVE-2016-1286 CVE-2016-2088
2016-03-10 00:03:34 +00:00
sthen
99d5f42fce bump (GeoIP pkgpath change) 2016-03-01 00:07:17 +00:00
sthen
1268bf479e update to BIND 9.10.3P3
- Fixed a regression in resolver.c:possibly_mark() which caused
known-bogus servers to be queried anyway. [RT #41321]

- render_ecs errors were mishandled when printing out a OPT record
resulting in a assertion failure. (CVE-2015-8705) [RT #41397]

- Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
2016-01-19 22:24:05 +00:00
sthen
64e6e88b23 bump isc-bind REVISION to avoid warnings with updates (different deps
between 5.8-stable and -current)
2015-12-17 17:07:41 +00:00
sthen
73a350007e update to bind-9.10.3-P2
4260.   [security]      Insufficient testing when parsing a message allowed
                        records with an incorrect class to be be accepted,
                        triggering a REQUIRE failure when those records
                        were subsequently cached. (CVE-2015-8000) [RT #40987]

4253.   [security]      Address fetch context reference count handling error
                        on socket error. (CVE-2015-8461) [RT#40945]
2015-12-15 22:43:37 +00:00
sthen
aec87238b3 oops, forgot to re-add json-c to WANTLIB/LIB_DEPENDS in previous commit.
spotted by nigel@
2015-10-07 19:36:50 +00:00
sthen
bbf0003393 reenable json stats in BIND, there used to be a problem with build on arch
without sync_val_compare_and_swap_4 but this was worked around in json-c.
reminded by jca.
2015-10-03 19:44:51 +00:00
sthen
c8c817ea19 build dig with SIGCHASE support 2015-09-25 14:02:31 +00:00
sthen
eef49f1bf6 update to BIND 9.10.3. add a bunch of patches because they now support
OpenSSL 1.1 api (OPENSSL_VERSION_NUMBER < / >= 0x10100000L checks).
2015-09-16 15:28:16 +00:00
sthen
a14d71ae63 SECURITY update to bind-9.10.2-P4: CVE-2015-5722, CVE-2015-5986 2015-09-02 20:25:43 +00:00
sthen
d4c0b14bbc Add a no_ssl flavour to BIND.
Expand the comment about json-c as that's broken on mips64 as well as hppa.
2015-08-24 20:46:49 +00:00
sthen
ac18a8a106 Security update to BIND 9.10.2p3 - a failure to reset a value to NULL in tkey.c
could result in an assertion failure. (CVE-2015-5477)
2015-07-28 20:03:35 +00:00
sthen
0aa3723bfe Build BIND with --enable-filter-aaaa, no change by default, but this allows
use of the filter-aaaa-on-v4 config option. Req'd by Marcus Andree.
2015-07-15 06:43:31 +00:00
sthen
b806684a18 update to BIND 9.10.2-P2, fixes CVE-2015-4620 - querying a malicious zone can
trigger a "REQUIRE" assertion failure in the resolver if DNSSEC validation
is enabled.
2015-07-07 19:32:47 +00:00
sthen
6f9fbef6a0 SECURITY update to BIND 9.10.2-P1, various problems with RPZ (policy zones),
and a possible crash with async zone loads. https://kb.isc.org/article/AA-01266

    "If you are using RPZ in BIND 9.10 in a production environment, and
    particularly if you have multiple policy zones, you should upgrade to
    BIND 9.10.2-P1. Otherwise, this upgrade is not urgent."
2015-06-10 22:40:41 +00:00
kettenis
5b67b7d496 Use $CC to link shared library to make sure crtbeginS.o gets linked in.
Switches CONFIGURE_STYLE to autoconf to make sure configure gets regenerated.

ok (and help from) sthen@
2015-05-16 10:15:53 +00:00
sthen
d10584daed take MAINTAINER 2015-03-14 22:26:21 +00:00
sthen
d46cd7c56f update to BIND 9.10.2 2015-03-14 21:01:54 +00:00
sthen
ebab207e7e update to BIND 9.10.2P2
On servers configured to perform DNSSEC validation using managed
   trust anchors (i.e., keys configured explicitly via managed-keys, or
   implicitly via dnssec-validation auto; or dnssec-lookaside auto;),
   revoking a trust anchor and sending a new untrusted replacement could
   cause named to crash with an assertion failure.  This could occur in
   the event of a botched key rollover, or potentially as a result of a
   deliberate attack if the attacker was in position to monitor the
   victim's DNS traffic.  This flaw was discovered by Jan-Piet Mens, and
   is disclosed in [CVE-2015-1349] [RT #38344] (**)
2015-02-18 22:49:44 +00:00
sthen
0591485581 previous change ("Disable json stats in bind") resulted in losing a couple
of symbols from libdns; bump SHARED_LIBS version and REVISION.
2015-01-30 15:15:42 +00:00
sthen
76f2dbf9cd Disable json stats in bind and zap BROKEN-hppa. 2015-01-15 22:34:02 +00:00
landry
f4253852ed BROKEN-hppa = uses json-c which requires atomic ops 2015-01-15 18:10:38 +00:00
sthen
9aa3e64853 Revert previous BIND workaround for query failures when coming up cold.
Instead, cherrypick a fix from git at source.isc.org; this exempts TLD and
root zone lookups from max-recursion-queries and changes the default to 75.
2014-12-17 23:39:17 +00:00
sthen
7a32acb9fa Update to BIND 9.10.1-P1, including query limits for recursion (DoS avoidance,
CVE-2014-8500), assertion DoS (recursive only, only with prefetch enabled,
CVE-2014-3214), assertion DoS (EDNS option processing, CVE-2014-3859) and
fixes to GeoIP (CVE-2014-8680 and another unclassified).

https://kb.isc.org/article/AA-01223/81/BIND-9.10.1-P1-Release-Notes.html

Add a local patch to increase the default query limit, during testing it
appears that the standard defaults can be easily falsely triggered during
priming at startup.
2014-12-09 17:21:36 +00:00
sthen
17fb16aa76 update to BIND 9.10.1 2014-09-23 09:42:41 +00:00
sthen
6e060bc8aa add comment (notes for possible renamings, things are a tad inconsistent at present) 2014-08-22 20:56:00 +00:00
sthen
2f2ec0320e install sample configs and switch to running as _bind uid 2014-08-22 20:32:13 +00:00
sthen
8cdfa4f6bf Update to BIND 9.10.0-P2, fixes CVE-2014-3859 "A query specially crafted to
exploit a defect in EDNS option processing can cause named to terminate with
an assertion failure. This fixes a missing isc_buffer_availablelength check
when printing out a packet." (This doesn't affect 9.9.x in 5.5-stable).

A few other fixes most of which don't affect us (one notable one is a
fix for GCC 4.9.0 optimizing away a null pointer check, more info on this
at https://kb.isc.org/article/AA-01167/)
2014-06-11 22:44:05 +00:00
sthen
f380382ce8 fix a remote-triggerable assertion crash in pre-fetch in the recursor,
introduced in BIND 9.10.0 (we only updated to this recently so no -stable
impact).  workaround "prefetch 0;".  CVE-2014-3214
2014-05-08 22:14:56 +00:00
sthen
d19ad24200 update to BIND 9.10.0 and add a flavour for the new geolocation support 2014-05-01 20:19:25 +00:00
ajacoutot
cfe4be35c5 No need to explicitely SUBST_VARS LOCALSTATEDIR anymore. 2014-04-15 08:53:04 +00:00
sthen
62adf653e3 sync upstream lib versions in comments in SHARED_LIBS lines; no pkg change 2014-01-31 10:14:46 +00:00
sthen
488ad17aee update to BIND 9.9.5
- patch to add another missing stdint.h inclusion for uintptr_t
- enable regression tests (these set temporary aliases on lo0;
should be safe, but I've set TEST_INTERACTIVE to avoid any unintended
consequences on bulk test runs).
2014-01-31 10:12:57 +00:00
sthen
fe5124d90c Update to BIND 9.9.4-P2, CVE-2014-0591 - an assertion can be triggered by
a crafted query against an NSEC3-signed zone, causing the server to exit.
Affects authoritative nameservers serving at least one NSEC3-signed zone.
Does not affect recursive-only servers, or auth servers which do not serve
NSEC3-signed zones.
2014-01-13 17:13:11 +00:00
sthen
aff1a21337 Update to BIND 9.9.4-PL1 - treat an all-zero netmask as invalid when
generating the localnets acl.
2013-11-06 20:37:11 +00:00
sthen
b9abfc174a don't use arc4random_addrandom to seed 2013-10-22 08:26:12 +00:00
sthen
23629488a3 update to BIND 9.9.4 - this release rolls in the RRL patches (ratelimit
flavour) to the main release, so pkgpath/conflict markers are set so that
updates are handled correctly
2013-09-19 23:33:11 +00:00
rpe
e3281ab567 RRL patches version naming scheme changed and
bump REVISION due to slightly changed patch file

with feedback from and ok sthen@
2013-08-28 20:55:22 +00:00