1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-20 23:58:38 +02:00
Commit Graph

89 Commits

Author SHA1 Message Date
Noah Meyerhans
47fcec43ab bind: update to 9.18.11
Fixes CVEs:
      - CVE-2022-3924: Fix serve-stale crash when recursive clients
      soft quota is reached.
      - CVE-2022-3736: Handle RRSIG lookups when serve-stale is
      active.
      - CVE-2022-3094: An UPDATE message flood could cause named to
      exhaust all available memory. This flaw was addressed by adding
      a new "update-quota" statement that controls the number of
      simultaneous UPDATE messages that can be processed or
      forwarded. The default is 100. A stats counter has been added to
      record events when the update quota is exceeded, and the XML and
      JSON statistics version numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2023-01-28 09:47:09 +02:00
Javier Marcet
073ee02500 bind: disable geoip
Signed-off-by: Javier Marcet <javier@marcet.info>
[modified also PKG_RELEASE]
2023-01-09 17:29:47 +02:00
Philip Prindeville
a7b770eec4 bind: start up with -4 if not listening on ipv6 addresses
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-01-02 14:15:57 -08:00
Philip Prindeville
07f528b331 bind: update to version 9.18.10
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-12-28 10:23:10 -08:00
Noah Meyerhans
ba76684a3d bind: bump to 9.18.7
Fixes multiple security issues:

CVE-2022-38178 - Fix memory leak in EdDSA verify processing

CVE-2022-3080 - Fix serve-stale crash that could happen when
			stale-answer-client-timeout was set to 0 and there was
			a stale CNAME in the cache for an incoming query

CVE-2022-2906 - Fix memory leaks in the DH code when using OpenSSL 3.0.0
			and later versions. The openssldh_compare(),
			openssldh_paramcompare(), and openssldh_todns()
			functions were affected

CVE-2022-2881 - When an HTTP connection was reused to get
			statistics from the stats channel, and zlib
			compression was in use, each successive
			response sent larger and larger blocks of memory,
			potentially reading past the end of the allocated
			buffer

CVE-2022-2795 - Prevent excessive resource use while processing large
			delegations

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-09-22 01:22:39 -07:00
Josef Schlehofer
fd3a6ac709
bind: update to version 9.18.4
Fixes:
- CVE-2022-1183

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-06-24 11:57:26 +02:00
Philip Prindeville
ede6c7f020
Merge pull request #18055 from pprindeville/bind-subpackage-ddns-confgen
bind: add subpackaging for ddns-confgen
2022-03-23 18:14:33 -06:00
Noah Meyerhans
4c6ea5379c bind: bump to 9.18.1
Fixes multiple security issues:

 * CVE-2022-0667 -- An assertion could occur in resume_dslookup() if the
                    fetch had been shut down earlier
 * CVE-2022-0635 -- Lookups involving a DNAME could trigger an INSIST when
                    "synth-from-dnssec" was enabled
 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
                    isc__nm_process_sock_buffer() to be called recursively,
                    which in turn left TCP connections hanging in the CLOSE_WAIT
                    state blocking indefinitely when out-of-order processing was
                    disabled.
 * CVE-2021-25220 -- The rules for acceptance of records into the cache
                     have been tightened to prevent the possibility of
                     poisoning if forwarders send records outside the
                     configured bailiwick

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-03-18 00:34:43 -07:00
Philip Prindeville
55055f70e4 bind: fix warnings about unknown options
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-17 08:38:05 -07:00
Philip Prindeville
9e4485b156 named: don't leak mktemp files on reload
Unless we're using "mktemp -u ..." (not recommended), it will
create the temp file as part of its safety checking.  Thus you
should only create the name (file) if you're going to use it,
and always remove it if you have created it.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-15 15:20:15 -07:00
Philip Prindeville
72d05acff0 bind: add subpackaging for ddns-confgen
ddns-confgen is a useful tool for generating partial zones for
transfer/update in dynamic DNS (ddns) scenarios.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2022-03-13 20:26:06 -06:00
Noah Meyerhans
6a0a55a5ed bind: support compile-time exclusion of DNS-over-HTTPS support
DoH is enabled by default, but disabling it removes the need to link
against libnghttp2, which may be desirable more constrained
environments.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-07 21:31:54 -08:00
Noah Meyerhans
127ef1207b bind: bump to 9.18.0
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2022-02-01 09:09:17 -08:00
Noah Meyerhans
249079187d bind: bump to 9.17.20
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-11-22 17:02:35 -08:00
Philip Prindeville
daf6b8b212 bind: created /var/run/named directory
Side-effect of dropping capabilities(7) with last commit is now we
need the `/var/run/named/` directory created for us at startup.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-10-31 16:01:44 -06:00
Philip Prindeville
a11d34617a
Merge pull request #16992 from pprindeville/named-restart-intf-flap
bind: detect new interfaces when they come up
2021-10-28 17:01:14 -06:00
Philip Prindeville
26bef5067c
Merge pull request #17010 from pprindeville/bind-update-9.17.19
bind: Bump to 9.17.19
2021-10-28 16:56:31 -06:00
Philip Prindeville
c2de702cbd bind: Bump to 9.17.19
The following CVE updates are included:

* CVE-2021-25219: The "lame-ttl" option is now forcibly set to 0. This
  effectively disables the lame server cache, as it could previously be
  abused by an attacker to significantly degrade resolver performance.

* CVE-2021-25218: An assertion failure occurred when named attempted
  to send a UDP packet that exceeded the MTU size, if Response Rate
  Limiting (RRL) was enabled.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-10-28 14:06:07 -06:00
Philip Prindeville
049b25bcf9 bind: detect new interfaces when they come up
Reload the service when interfaces flap; note that libcap support
is required to open new sockets on interfaces coming up during
a reload, otherwise a full restart would be needed.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-10-28 14:00:43 -06:00
Philip Prindeville
a39a8372b3 bind: deprecate managed-keys
This has been replaced with the "trust-anchors" keyword, per
section 8.21.1 New Features of the Bind 9 Administrator Reference
Manual:

• In order to clarify the configuration of DNSSEC keys, the trusted-keys and managed-keys statements have been deprecated, and the new trust-anchors statement should now be used for both types of key.
  When used with the keyword initial-key, trust-anchors has the same behavior as managed-keys, i.e., it configures a trust anchor that is to be maintained via RFC 5011.
  When used with the new keyword static-key, trust-anchors has the same behavior as trusted-keys, i.e., it configures a permanent trust anchor that will not automatically be updated. (This usage is not recommended for the root key.) [GL #6]

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-10-27 21:49:31 -06:00
Noah Meyerhans
2e02d899ae bind: bump to 9.17.13
Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-05-27 13:52:13 -07:00
Noah Meyerhans
ccb1e8923e bind: bump to 9.17.12
Fixes the following security issues:

* CVE-2021-25215 - named crashed when a DNAME record placed in the ANSWER
                   section during DNAME chasing turned out to be the final
                   answer to a client query.
* CVE-2021-25214 - Insufficient IXFR checks could result in named serving a
                   zone without an SOA record at the apex, leading to a
                   RUNTIME_CHECK assertion failure when the zone was
                   subsequently refreshed. This has been fixed by adding an
                   owner name check for all SOA records which are included
                   in a zone transfer.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-04-29 12:39:46 -07:00
Rosen Penev
dd64cb713b bind: update to 9.17.11
Backport upstream OpenSSL deprecated API patch.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-03-21 20:38:25 -07:00
Michael Heimpold
20592140af bind: fix linking with full language support enabled
After d18692c, we need to include nls.mk to setup correct
environment variables so that linking succeeds.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2021-03-04 22:42:11 +01:00
Noah Meyerhans
f33ab76019 bind: bump to 9.17.10
Add build dependency on libnghttp2 for DNS-over-HTTPS support

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-02-18 14:43:14 -08:00
Noah Meyerhans
437e131fe0 bind: bump to 9.17.9
Drop obsolete patches

 - 001-no-tests.patch
 - 002-fix-cross-compilation.patch

Move several user-executable binaries from /usr/sbin to /usr/bin per
upstream.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-01-29 09:10:31 -08:00
Philip Prindeville
52c4c84700 bind: start named early enough to be present when isc-dhcp starts
Start named before dhcpd so that dhcpd can prime the local zones at startup.

Restore the empty domain zone for rfc1918 addresses that previously existed.

Create an additional subsidiary named.conf.local file (initially empty)
in /tmp/bind/ that can be seeded with dynamic zones and primed with
"rndc reload", and add it to the watched list of config files for procd.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-15 14:03:25 -07:00
Philip Prindeville
31a256f0ab bind: add support for the 'rndc' utility
Enable the control port on named that rncd uses to talk to it. Use
rndc to allow for lightweight reloads of some (per-zone) or all of
the database without an interruption of service.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-13 13:31:13 -07:00
Josef Schlehofer
d442033941 bind: update to version 9.16.8
- DNS Flag Day 2020
(default EDNS buffer size changed from 4096 to 1232 bytes)

-- Added patch, which should be part of the next release
It fixes an issue while cross-compilation (I linked it in the commit
message with issue link)

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-10-31 06:39:05 -07:00
Josef Schlehofer
ededaf2977
bind: update to version 9.16.7
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-10-05 19:49:50 +02:00
Noah Meyerhans
cf61f7f8ef bind: New upstream version 9.16.6
Several security issures are addressed:

 - CVE-2020-8620 It was possible to trigger an assertion failure by sending
   a specially crafted large TCP DNS message.
 - CVE-2020-8621 named could crash after failing an assertion check in
   certain query resolution scenarios where QNAME minimization and
   forwarding were both enabled. To prevent such crashes, QNAME minimization is
   now always disabled for a given query resolution process, if forwarders are
   used at any point.
 - CVE-2020-8622 It was possible to trigger an assertion failure when
   verifying the response to a TSIG-signed request.
 - CVE-2020-8623 When BIND 9 was compiled with native PKCS#11 support, it
   was possible to trigger an assertion failure in code determining the
   number of bits in the PKCS#11 RSA public key with a specially crafted
   packet.
 - CVE-2020-8624 update-policy rules of type subdomain were incorrectly
   treated as zonesub rules, which allowed keys used in subdomain rules to
   update names outside of the specified subdomains. The problem was fixed by
   making sure subdomain rules are again processed as described in the ARM.

Full release notes are available at
https://ftp.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2020-08-23 19:58:34 -07:00
Tiago Gaspar
b8f8af8a30 bind: update to 9.16.4
This update fixes the following CVE's:
- CVE-2020-8618
- CVE-2020-8619

More info on bug fixes and feature changes in:
https://downloads.isc.org/isc/bind9/9.16.4/doc/arm/html/notes.html

Signed-off-by: Tiago Gaspar <tiagogaspar8@gmail.com>
2020-07-04 12:12:17 +01:00
Ian Cooper
4cb5aa57fd
bind: add nslookup alternative to busybox nslookup
Add alternative to busybox nslookup. Busybox throws an error when
the host does not have an AAAA record.

Signed-off-by: Ian Cooper <iancooper@hotmail.com>
2020-05-26 16:48:52 +01:00
Josef Schlehofer
a75391575b bind: update to version 9.16.3
Fixes:
CVE-2020-8616
CVE-2020-8617

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2020-05-20 11:24:22 -07:00
Jan Pavlinec
c8be44062e bind: update to version (security fix)
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-05-01 11:56:56 -07:00
Noah Meyerhans
72654d20d5 bind9: update to 9.16.1
Add libuv dependency

Fix optional libxml and c-json dependency handling

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2020-04-07 21:47:07 -07:00
Rosen Penev
bdc23034ca bind: use json-c instead of jsoncpp
The configure script prefers the latter whereas the code prefers the
latter. Hack around it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-04-07 12:32:18 -07:00
Jan Pavlinec
46ca2c79ca
bind: update to version 9.14.8 (security fix)
Fixes CVE-2019-6477

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-11-21 13:14:23 +01:00
Josef Schlehofer
7b9af101f6
bind: Update to version 9.14.7
Fixes CVE-2019-6475 and CVE-2019-6476

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-11-06 18:15:20 +01:00
Josef Schlehofer
61dcd6849f
bind: Update to version 9.14.6
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-09-19 21:20:34 +02:00
Josef Schlehofer
8ca1525a8d
bind: Update to version 9.14.5
Add PKG_LICENSE_FILES

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-09-01 19:00:07 +02:00
DENG Qingfang
e7d35f6deb bind: update to 9.14.4
Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-07-30 03:28:40 +08:00
Deng Qingfang
868f29d4ee bind: update to 9.14.3
Fixed CVE-2019-6471

ChangeLog: https://ftp.isc.org/isc/bind9/9.14.3/CHANGES

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-06-26 16:25:44 -07:00
Deng Qingfang
cc66a24a4e bind: update to 9.14.2
BIND now requires POSIX thread and IPv6 support to build

Add filter-AAAA plugin

Remove unrecognized options

Remove patch that no longer needed
- 002-autoconf-ar-fix.patch

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-05-19 00:16:41 +08:00
Deng Qingfang
7c0c22f6f7 bind: update to 9.12.3-P4
Fixed CVEs:

CVE-2018-5744
CVE-2018-5745
CVE-2019-6465

Add PKG_CPE_ID
Size optimizations

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-02-24 12:28:18 -08:00
Deng Qingfang
4f41588c29 bind: update to 9.12.3-P1 and other
Refresh patches
Remove --enable-static and --enable-dynamic because they're enabled by default
Enable parallel compilation
Fix compile without IPv6

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-02-03 12:25:52 -08:00
Deng Qingfang
7ce7898d13 bind: update to 9.11.5-P1
For changes in 9.11.5-P1 see https://ftp.isc.org/isc/bind9/9.11.5-P1/CHANGES

Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
2019-01-12 21:26:32 -08:00
Josef Schlehofer
cfa2f83d65 bind: change http servers to https
Signed-off-by: Josef Schlehofer <josef.schlehofer@nic.cz>
2018-11-23 22:12:24 -08:00
Josef Schlehofer
2d4f6719cb bind: a little bit polishing of Makefile
Signed-off-by: Josef Schlehofer <josef.schlehofer@nic.cz>
2018-11-23 22:12:24 -08:00
Noah Meyerhans
6f320da526 bind: Update bind.keys
A multi-year DNSSEC root key update is in progress, as described at
https://www.isc.org/downloads/bind/bind-keys/. This change refreshes the
bind.keys file, ensuring that the new key, in place as of 2018-10-11,
will be recognized and trusted.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2018-10-29 08:36:37 -07:00