Date: Mon, 13 Jan 2014 17:54:05 +0000 (UTC) From: Mathieu Arnold <mat@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r339614 - in branches/2014Q1: dns/bind96 dns/bind98 dns/bind99 security/vuxml Message-ID: <201401131754.s0DHs5vF091675@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mat Date: Mon Jan 13 17:54:04 2014 New Revision: 339614 URL: http://svnweb.freebsd.org/changeset/ports/339614 Log: MFH: r339612 Security update to fix CVE-2014-0591 as reported at https://kb.isc.org/article/AA-01078/74/ 9.9.4 -> 9.9.4-P2 9.8.6 -> 9.8.6-P2 9.6-ESV-R10 -> 9.6-ESV-R10-P2 Security: CVE-2014-0591 Remote DOS Approved by: portmgr (implicit) Modified: branches/2014Q1/dns/bind96/Makefile branches/2014Q1/dns/bind96/distinfo branches/2014Q1/dns/bind98/Makefile branches/2014Q1/dns/bind98/distinfo branches/2014Q1/dns/bind99/Makefile branches/2014Q1/dns/bind99/distinfo branches/2014Q1/security/vuxml/vuln.xml Directory Properties: branches/2014Q1/ (props changed) Modified: branches/2014Q1/dns/bind96/Makefile ============================================================================== --- branches/2014Q1/dns/bind96/Makefile Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind96/Makefile Mon Jan 13 17:54:04 2014 (r339614) @@ -1,8 +1,7 @@ # $FreeBSD$ PORTNAME= bind96 -PORTVERSION= 9.6.3.2.ESV.R10 -PORTREVISION= 2 +PORTVERSION= 9.6.3.2.ESV.R10.2 CATEGORIES= dns net ipv6 MASTER_SITES= ${MASTER_SITE_ISC} MASTER_SITE_SUBDIR= bind9/${ISCVERSION} @@ -14,7 +13,7 @@ COMMENT= BIND DNS suite with updated DNS LICENSE= ISCL # ISC releases things like 9.4.0b3, which our versioning doesn't like -ISCVERSION= 9.6-ESV-R10 +ISCVERSION= 9.6-ESV-R10-P2 MAKE_JOBS_UNSAFE= yes Modified: branches/2014Q1/dns/bind96/distinfo ============================================================================== --- branches/2014Q1/dns/bind96/distinfo Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind96/distinfo Mon Jan 13 17:54:04 2014 (r339614) @@ -1,2 +1,2 @@ -SHA256 (bind-9.6-ESV-R10.tar.gz) = f34e24a7d4bd41eedd7b781fbca3f8dc29e6f677be3b9f418f8581debbc4a66c -SIZE (bind-9.6-ESV-R10.tar.gz) = 6420776 +SHA256 (bind-9.6-ESV-R10-P2.tar.gz) = 1b131ef3a3b27a7916815ec5f4a87f0d9f5ac0669df21c7ec75ba18a13238eda +SIZE (bind-9.6-ESV-R10-P2.tar.gz) = 6421474 Modified: branches/2014Q1/dns/bind98/Makefile ============================================================================== --- branches/2014Q1/dns/bind98/Makefile Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind98/Makefile Mon Jan 13 17:54:04 2014 (r339614) @@ -1,8 +1,7 @@ # $FreeBSD$ PORTNAME= bind98 -PORTVERSION= 9.8.6 -PORTREVISION= 2 +PORTVERSION= 9.8.6.2 CATEGORIES= dns net ipv6 MASTER_SITES= ${MASTER_SITE_ISC} MASTER_SITE_SUBDIR= bind9/${ISCVERSION} @@ -14,7 +13,7 @@ COMMENT= BIND DNS suite with updated DNS LICENSE= ISCL # ISC releases things like 9.8.0-P1, which our versioning doesn't like -ISCVERSION= 9.8.6 +ISCVERSION= 9.8.6-P2 MAKE_JOBS_UNSAFE= yes Modified: branches/2014Q1/dns/bind98/distinfo ============================================================================== --- branches/2014Q1/dns/bind98/distinfo Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind98/distinfo Mon Jan 13 17:54:04 2014 (r339614) @@ -1,4 +1,4 @@ -SHA256 (bind-9.8.6.tar.gz) = 01cc3a0105b47833b99e61b69acd824be4eeefd6557fffa26eced8e03f1249cd -SIZE (bind-9.8.6.tar.gz) = 7275769 +SHA256 (bind-9.8.6-P2.tar.gz) = e5c87bdf102ac5b2563955393a2f4805e7574dc7addd03d18152c2f70befedeb +SIZE (bind-9.8.6-P2.tar.gz) = 7275835 SHA256 (rpz2+rl-9.8.6.patch) = 76b988205ce17034ff6c03cff943d0e579a5a46dbc47e1fac83704c88fb96d79 SIZE (rpz2+rl-9.8.6.patch) = 348361 Modified: branches/2014Q1/dns/bind99/Makefile ============================================================================== --- branches/2014Q1/dns/bind99/Makefile Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind99/Makefile Mon Jan 13 17:54:04 2014 (r339614) @@ -1,8 +1,7 @@ # $FreeBSD$ PORTNAME?= bind99 -PORTVERSION= 9.9.4 -PORTREVISION?= 2 +PORTVERSION= 9.9.4.2 CATEGORIES= dns net ipv6 MASTER_SITES= ${MASTER_SITE_ISC} MASTER_SITE_SUBDIR= bind9/${ISCVERSION} @@ -14,7 +13,7 @@ COMMENT= BIND DNS suite with updated DNS LICENSE= ISCL # ISC releases things like 9.8.0-P1, which our versioning doesn't like -ISCVERSION= 9.9.4 +ISCVERSION= 9.9.4-P2 MAKE_JOBS_UNSAFE= yes Modified: branches/2014Q1/dns/bind99/distinfo ============================================================================== --- branches/2014Q1/dns/bind99/distinfo Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/dns/bind99/distinfo Mon Jan 13 17:54:04 2014 (r339614) @@ -1,2 +1,2 @@ -SHA256 (bind-9.9.4.tar.gz) = fe0f16653382e428b10282ce9850722d19589d66f2b45a528e98be3153f654c8 -SIZE (bind-9.9.4.tar.gz) = 7513017 +SHA256 (bind-9.9.4-P2.tar.gz) = 50f3c6431e26d3f322b69092a49c92e163e73029fe4a1933ce532dc97ec40a89 +SIZE (bind-9.9.4-P2.tar.gz) = 7513077 Modified: branches/2014Q1/security/vuxml/vuln.xml ============================================================================== --- branches/2014Q1/security/vuxml/vuln.xml Mon Jan 13 17:41:08 2014 (r339613) +++ branches/2014Q1/security/vuxml/vuln.xml Mon Jan 13 17:54:04 2014 (r339614) @@ -51,6 +51,48 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="cb252f01-7c43-11e3-b0a6-005056a37f68"> + <topic>bind -- denial of service vulnerability</topic> + <affects> + <package> + <name>bind99</name> + <name>bind99-base</name> + <range><lt>9.9.4.2</lt></range> + </package> + <package> + <name>bind98</name> + <name>bind98-base</name> + <range><lt>9.8.6.2</lt></range> + </package> + <package> + <name>bind96</name> + <name>bind96-base</name> + <range><lt>9.6.3.2.ESV.R10.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://kb.isc.org/article/AA-01078/74/"> + <p>Because of a defect in handling queries for NSEC3-signed zones, + BIND can crash with an "INSIST" failure in name.c when processing + queries possessing certain properties. By exploiting this defect + an attacker deliberately constructing a query with the right + properties could achieve denial of service against an authoritative + nameserver serving NSEC3-signed zones.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-0591</cvename> + <url>https://kb.isc.org/article/AA-01078/74/</url> + </references> + <dates> + <discovery>2014-01-08</discovery> + <entry>2014-01-13</entry> + </dates> + </vuln> + <vuln vid="28c575fa-784e-11e3-8249-001cc0380077"> <topic>libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401131754.s0DHs5vF091675>