Date: Wed, 14 Aug 2019 12:24:08 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 239850] dns/powerdns: Update to 4.1.13 (Fixes security vulnerability) Message-ID: <bug-239850-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D239850 Bug ID: 239850 Summary: dns/powerdns: Update to 4.1.13 (Fixes security vulnerability) Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: tremere@cainites.net Created attachment 206533 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D206533&action= =3Dedit Update to PowerDNS Auhoritative Server 4.1.13 4.1.13 changelog: The 4.1.12 release was skipped due to a packaging issue. This is a bugfix release for high traffic setups using the pipebackend or remotebackend. It contains the following changes: gpgsqlbackend: add missing schema file to Makefile (#8157) stop using select() in places where FDs can be >1023 (#8162) 4.1.11 changelog: This release contains the updated PostgreSQL schema for PowerDNS Security Advisory 2019-06 (CVE-2019-10203). Upgrading is not enough - you need to manually apply the schema change: ALT= ER TABLE domains ALTER notified_serial TYPE bigint USING CASE WHEN notified_se= rial >=3D 0 THEN notified_serial::bigint END; =3D=3D=3D=3D=3D=3D I've added a pkg-install file with a 10s delay which essentially says the s= ame as mentioned in the 4.1.11 changelog. Since this is the first time a schema change is required to fix a security vulnerability I hope this is the best = way to do it. If not... I'm ready to be educated :) =3D=3D=3D=3D=3D=3D QA: portlint: OK (looks fine.) testport: OK (12.0, amd64) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-239850-7788>