Commit Graph

71 Commits

Author SHA1 Message Date
Noah Meyerhans 35667c546e bind: bump to 9.16.37
Fixes multiple CVEs. Upstream changelog is
https://ftp.isc.org/isc/bind9/9.16.37/CHANGES

CVEs fixed:

CVE-2022-3924: Fix serve-stale crash when recursive clients soft quota
			is reached.

CVE-2022-3736: Handle RRSIG lookups when serve-stale is active.

CVE-2022-3094: An UPDATE message flood could cause named to exhaust all
			available memory. This flaw was addressed by adding a
			new "update-quota" statement that controls the number of
			simultaneous UPDATE messages that can be processed or
			forwarded. The default is 100. A stats counter has been
			added to record events when the update quota is
			exceeded, and the XML and JSON statistics version
			numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2023-01-29 12:56:37 +02:00
Josef Schlehofer 72b0fb294a
bind: update to version 9.16.33
Changelog:
https://downloads.isc.org/isc/bind9/9.16.33/RELEASE-NOTES-bind-9.16.33.html

Fixes:
- multiple CVEs
(CVE-2022-2795, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-25 12:16:10 +02:00
Josef Schlehofer e2ce67c8d4
bind: update to version 9.16.31
Release notes:
https://downloads.isc.org/isc/bind9/9.16.31/doc/arm/html/notes.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-08-02 16:43:23 +02:00
Josef Schlehofer f172d67c96
bind: update to version 9.16.30
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-24 11:46:35 +02:00
Josef Schlehofer 9377a39b19
bind: update to version 9.16.28
Changelog:
https://downloads.isc.org/isc/bind9/9.16.28/RELEASE-NOTES-bind-9.16.28.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-04-24 15:15:19 +02:00
Noah Meyerhans e8dc42753c bind: bump to 9.16.27
Fixes security issues:

 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
			isc__nm_process_sock_buffer() to be called recursively,
			which in turn left TCP connections hanging in the
			CLOSE_WAIT state blocking indefinitely when
			out-of-order processing was disabled.

 * CVE-2021-25220 -- The rules for acceptance of records into the cache
			have been tightened to prevent the possibility of
			poisoning if forwarders send records outside
			the configured bailiwick.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-03-18 10:39:38 -07:00
Josef Schlehofer c0c89af7c4
bind: update to version 9.16.25
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-02-02 18:47:36 +01:00
Josef Schlehofer c559096e03 bind: update to version 9.16.23
Changelog:
https://downloads.isc.org/isc/bind9/9.16.23/RELEASE-NOTES-bind-9.16.23.html

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-11-18 08:40:52 -08:00
Noah Meyerhans 9abe24fb49 bind: Bump to 9.16.22
The following CVEs are addressed:

* CVE-2021-25219: The "lame-ttl" option is now forcibly set to 0. This
  effectively disables the lame server cache, as it could previously
  be abused by an attacker to significantly degrade resolver performance.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-10-28 21:15:16 -07:00
Josef Schlehofer 18af9b9e21 bind: update to version 9.16.21
- Remove patch, which is part of this release, it was backported from
  upstream

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-10-24 20:37:33 -07:00
Josef Schlehofer 7a7b8a257b bind: update to version 9.16.20
1. Fixes: CVE-2021-25218

2. Add patch to bump API version, which was forgotten by BIND devs
Related to https://kb.isc.org/docs/map-zone-format-incompatibility-in-bind-9-16-20-and-9-17-17
Pointed out in https://www.openwall.com/lists/oss-security/2021/08/20/2

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-09-08 13:19:09 -07:00
Josef Schlehofer 1cd6a5f019
bind: update to version 9.16.18
Changelog:
https://downloads.isc.org/isc/bind9/9.16.18/doc/arm/html/notes.html#notes-for-bind-9-16-18

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-07-10 23:02:20 +02:00
Noah Meyerhans 9fd4ed8afa bind: bump to 9.16.15
Fixes the following security issues:

* CVE-2021-25216 - A specially crafted GSS-TSIG query could cause a buffer
                   overflow in the ISC implementation of SPNEGO.
* CVE-2021-25215 - named crashed when a DNAME record placed in the ANSWER
                   section during DNAME chasing turned out to be the final
                   answer to a client query.
* CVE-2021-25214 - Insufficient IXFR checks could result in named serving a
                   zone without an SOA record at the apex, leading to a
                   RUNTIME_CHECK assertion failure when the zone was
                   subsequently refreshed. This has been fixed by adding an
                   owner name check for all SOA records which are included
                   in a zone transfer.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-04-29 17:33:12 -07:00
Josef Schlehofer 44b301125f bind: update to version 9.16.13
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2021-03-21 20:35:45 -07:00
Noah Meyerhans fcf72948ae bind: bump to 9.16.12
Includes fix for security issues:

* CVE-2020-8625: BIND servers are vulnerable if they are running an
  affected version and are configured to use GSS-TSIG features.

Disable backtrace functionality, as it is unreliable across
architectures and generally only supported by upstream on amd64

Remove a patch that has been incorporated upstream

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-02-18 15:46:39 -08:00
Josef Schlehofer 3a61338ab4
bind: update to version 9.16.8
- DNS Flag Day 2020
(default EDNS buffer size changed from 4096 to 1232 bytes)

-- Added patch, which should be part of the next release
It fixes an issue while cross-compilation (I linked it in the commit
message with issue link)

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit d442033941)
2020-11-02 00:35:03 +01:00
Josef Schlehofer 70bb0b4c81
bind: update to version 9.16.7
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit ededaf2977)
2020-10-16 17:46:00 +02:00
Noah Meyerhans 9700cea704
bind: New upstream version 9.16.6
Several security issures are addressed:

 - CVE-2020-8620 It was possible to trigger an assertion failure by sending
   a specially crafted large TCP DNS message.
 - CVE-2020-8621 named could crash after failing an assertion check in
   certain query resolution scenarios where QNAME minimization and
   forwarding were both enabled. To prevent such crashes, QNAME minimization is
   now always disabled for a given query resolution process, if forwarders are
   used at any point.
 - CVE-2020-8622 It was possible to trigger an assertion failure when
   verifying the response to a TSIG-signed request.
 - CVE-2020-8623 When BIND 9 was compiled with native PKCS#11 support, it
   was possible to trigger an assertion failure in code determining the
   number of bits in the PKCS#11 RSA public key with a specially crafted
   packet.
 - CVE-2020-8624 update-policy rules of type subdomain were incorrectly
   treated as zonesub rules, which allowed keys used in subdomain rules to
   update names outside of the specified subdomains. The problem was fixed by
   making sure subdomain rules are again processed as described in the ARM.

Full release notes are available at
https://ftp.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit cf61f7f8ef)
2020-08-24 10:33:04 +02:00
Tiago Gaspar 256a631d9c
bind: update to 9.16.4
This update fixes the following CVE's:
- CVE-2020-8618
- CVE-2020-8619

More info on bug fixes and feature changes in:
https://downloads.isc.org/isc/bind9/9.16.4/doc/arm/html/notes.html

Signed-off-by: Tiago Gaspar <tiagogaspar8@gmail.com>
(cherry picked from commit b8f8af8a30)
2020-08-24 10:32:59 +02:00
Ian Cooper b80db2c800
bind: add nslookup alternative to busybox nslookup
Add alternative to busybox nslookup. Busybox throws an error when
the host does not have an AAAA record.

Signed-off-by: Ian Cooper <iancooper@hotmail.com>
(cherry picked from commit 4cb5aa57fd)
2020-07-01 15:42:09 +02:00
Josef Schlehofer 3c3a1f7618
bind: update to version 9.16.3
Fixes:
CVE-2020-8616
CVE-2020-8617

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit a75391575b)
2020-07-01 15:42:04 +02:00
Jan Pavlinec 177623c5fe
bind: update to version (security fix)
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry picked from commit c8be44062e)
2020-07-01 15:41:57 +02:00
Noah Meyerhans b73f479ea4
bind9: update to 9.16.1
Add libuv dependency

Fix optional libxml and c-json dependency handling

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 72654d20d5)
2020-07-01 15:41:31 +02:00
Josef Schlehofer 49ac1e8b74 bind: update to version 9.14.12
Fixes:
CVE-2020-8616
CVE-2020-8617

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-05-20 11:25:23 -07:00
Jan Pavlinec fd254a04c8
bind: update to version 9.14.8 (security fix)
Fixes CVE-2019-6477

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
(cherry-picked from commit 46ca2c7)
2019-11-22 08:48:19 +01:00
Josef Schlehofer e9748d34f5
bind: Update to version 9.14.7
Fixes CVE-2019-6475 and CVE-2019-6476

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry-picked from commit 7b9af101f6)
2019-11-10 18:29:29 +01:00
Josef Schlehofer a454ee3cd6
bind: Update to version 9.14.6
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry-picked from commit 61dcd6849f)
2019-10-20 02:06:08 +02:00
Josef Schlehofer 98519844ac
bind: Update to version 9.14.5
Add PKG_LICENSE_FILES

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry-picked from commit 8ca1525a8d)
2019-10-20 02:05:55 +02:00
DENG Qingfang 81eb936054
bind: update to 9.14.4
Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
(cherry-picked from commit e7d35f6deb)
2019-09-01 18:23:10 +02:00
Deng Qingfang b07a9fa83d
bind: update to 9.14.3
Fixed CVE-2019-6471

ChangeLog: https://ftp.isc.org/isc/bind9/9.14.3/CHANGES

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
(cherry-picked from 868f29d4ee)
2019-07-09 11:47:09 +02:00
Deng Qingfang cc66a24a4e bind: update to 9.14.2
BIND now requires POSIX thread and IPv6 support to build

Add filter-AAAA plugin

Remove unrecognized options

Remove patch that no longer needed
- 002-autoconf-ar-fix.patch

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-05-19 00:16:41 +08:00
Deng Qingfang 7c0c22f6f7 bind: update to 9.12.3-P4
Fixed CVEs:

CVE-2018-5744
CVE-2018-5745
CVE-2019-6465

Add PKG_CPE_ID
Size optimizations

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-02-24 12:28:18 -08:00
Deng Qingfang 4f41588c29 bind: update to 9.12.3-P1 and other
Refresh patches
Remove --enable-static and --enable-dynamic because they're enabled by default
Enable parallel compilation
Fix compile without IPv6

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-02-03 12:25:52 -08:00
Deng Qingfang 7ce7898d13 bind: update to 9.11.5-P1
For changes in 9.11.5-P1 see https://ftp.isc.org/isc/bind9/9.11.5-P1/CHANGES

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-01-12 21:26:32 -08:00
Josef Schlehofer cfa2f83d65 bind: change http servers to https
Signed-off-by: Josef Schlehofer <josef.schlehofer@nic.cz>
2018-11-23 22:12:24 -08:00
Josef Schlehofer 2d4f6719cb bind: a little bit polishing of Makefile
Signed-off-by: Josef Schlehofer <josef.schlehofer@nic.cz>
2018-11-23 22:12:24 -08:00
Noah Meyerhans 6f320da526 bind: Update bind.keys
A multi-year DNSSEC root key update is in progress, as described at
https://www.isc.org/downloads/bind/bind-keys/. This change refreshes the
bind.keys file, ensuring that the new key, in place as of 2018-10-11,
will be recognized and trusted.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-10-29 08:36:37 -07:00
Noah Meyerhans 13a6326cc4 bind: Include delv in the bind-tools package
delv is a tool for sending DNS queries and validating the results, using the
same internal resolver and validator logic as named.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-10-29 08:36:37 -07:00
Noah Meyerhans f9fbc75557 bind: Update to 9.11.5
This includes the fix for CVE-2018-5738: When recursion is enabled but the
allow-recursion and allow-query-cache ACLs are not specified, they should be
limited to local networks, but they were inadvertently set to match the default
allow-query, thus allowing remote queries.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-10-29 08:36:37 -07:00
Rosen Penev 432aa67e27 bind: Remove OpenSSL deprecated APIs dependency
It seems to not be needed anymore. Tested on mvebu and ar71xx.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2018-10-28 15:28:52 -07:00
Noah Meyerhans 50ce6735f8
bind: Explicitly disable libatomic support (#6375)
By default, libatomic is conditionally enabled on some platforms, but it's not
strictly necessary. We'll disable it here globally rather than introduce an
unnecessary dependency.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-06-28 08:23:58 -07:00
Noah Meyerhans 2e030a7b81 bind: update PKG_LICENSE to reflect upstream change
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-06-13 21:48:18 -07:00
Noah Meyerhans 037f1def7d bind: Update to version 9.11.3 and optionally support eddsa for dnssec
EdDSA support is optional and currently defaults to being disabled.

The following security issues are addressed with this update:

  * An error in TSIG handling could permit unauthorized zone transfers
    or zone updates. These flaws are disclosed in CVE-2017-3142 and
    CVE-2017-3143.
  * The BIND installer on Windows used an unquoted service path, which
    can enable privilege escalation. This flaw is disclosed in
    CVE-2017-3141.
  * With certain RPZ configurations, a response with TTL 0 could cause
    named to go into an infinite query loop. This flaw is disclosed in
    CVE-2017-3140.
  * Addresses could be referenced after being freed during resolver
    processing, causing an assertion failure. The chances of this
    happening were remote, but the introduction of a delay in
    resolution increased them. This bug is disclosed in CVE-2017-3145.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-06-13 21:46:03 -07:00
Noah Meyerhans f714c9071d bind: Update to 9.11.2-P1
New upstream release fixes the following security issues:

 * CVE-2017-3145: BIND was improperly sequencing cleanup operations on
   upstream recursion fetch contexts, leading in some cases to a use-after-free
   error that can trigger an assertion failure and crash in named.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-01-17 08:56:31 -08:00
Hal Martin 66231b6d24 bind: add support for building bind with libxml2 or libjson
At least one of libjson|libxml2 is required for bind
statistics to function.

Selecting libjson|libxml2 will result in an additional
dependency required to build and install bind-libs.

Signed-off-by: Hal Martin <hal.martin@gmail.com>
2017-11-23 15:15:40 +00:00
Stijn Tintel fd7094027c bind: disable lmdb
When building on hosts with lmdb installed, bind configure phase fails:

  configure: error: found lmdb include but not library.

Solve this by disabling lmdb. Fixes #4748.

Fixes: eab56b6bee ("bind: version update to 9.11.2")
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2017-08-24 18:17:29 +03:00
Philip Prindeville 21eb19e162 bind: patch unneeded if openssl is build w/ deprecated
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-08-08 10:53:31 -06:00
Philip Prindeville eab56b6bee bind: version update to 9.11.2
Also refresh patches and dependencies.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2017-08-07 12:03:47 -06:00
Noah Meyerhans 1d37fd115f bind: Update to 9.10.5-P3
New upstream release includes fixes for the following security issues:

 * CVE-2017-3140: With certain RPZ configurations, a response with TTL 0 could
   cause named to go into an infinite query loop
 * CVE-2017-3142: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.
 * CVE-2017-3143: An error in TSIG handling could permit unauthorized zone
   transfers or zone updates.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2017-07-16 15:16:36 -07:00
Sami Olmari fcf5a48a7a bind: Include dnssec-settime in bind-dnssec/tool
<net/bind>

Maintainer: @nmeyerhans
Compile tested: x86_64, OpenWRT 50107
Run tested: x86 / 64, OpenWRT 50107

Description:

Added dnssec-settime into bind-dnssec and bind-tools

Signed-off-by: Sami Olmari <sami+git@olmari.fi>
2017-06-06 01:47:05 +03:00