Received: by mail.netbsd.org (Postfix, from userid 605) id 70D1C84F25; Wed, 21 Sep 2022 12:58:49 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id A09E984F23 for ; Wed, 21 Sep 2022 12:58:48 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 8lflVgygtYgO for ; Wed, 21 Sep 2022 12:58:47 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 6545984E9F for ; Wed, 21 Sep 2022 12:58:47 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 5E627FA90; Wed, 21 Sep 2022 12:58:47 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1663765127166090" MIME-Version: 1.0 Date: Wed, 21 Sep 2022 12:58:47 +0000 From: "Havard Eidnes" Subject: CVS commit: pkgsrc/net/bind916 To: pkgsrc-changes@NetBSD.org Reply-To: he@netbsd.org X-Mailer: log_accum Message-Id: <20220921125847.5E627FA90@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1663765127166090 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: he Date: Wed Sep 21 12:58:47 UTC 2022 Modified Files: pkgsrc/net/bind916: Makefile distinfo Log Message: Upgrade net/bind916 to version 9.16.33. OKed by wiz@ Pkgsrc changes: * Just checksum updates. Upstream changes: --- 9.16.33 released --- 5962. [security] Fix memory leak in EdDSA verify processing. (CVE-2022-38178) [GL #3487] 5961. [security] Fix memory leak in ECDSA verify processing. (CVE-2022-38177) [GL #3487] 5960. [security] Fix serve-stale crash that could happen when stale-answer-client-timeout was set to 0 and there was a stale CNAME in the cache for an incoming query. (CVE-2022-3080) [GL #3517] 5957. [security] Prevent excessive resource use while processing large delegations. (CVE-2022-2795) [GL #3394] 5956. [func] Make RRL code treat all QNAMEs that are subject to wildcard processing within a given zone as the same name. [GL #3459] 5955. [port] The libxml2 library has deprecated the usage of xmlInitThreads() and xmlCleanupThreads() functions. Use xmlInitParser() and xmlCleanupParser() instead. [GL #3518] 5954. [func] Fallback to IDNA2003 processing in dig when IDNA2008 conversion fails. [GL #3485] 5953. [bug] Fix a crash on shutdown in delete_trace_entry(). Add mctx attach/detach pair to make sure that the memory context used by a memory pool is not destroyed before the memory pool itself. [GL #3515] 5952. [bug] Use quotes around address strings in YAML output. [GL #3511] 5951. [bug] In some cases, the dnstap query_message field was erroneously set when logging response messages. [GL #3501] 5948. [bug] Fix nsec3.c:dns_nsec3_activex() function, add a missing dns_db_detachnode() call. [GL #3500] 5945. [bug] If parsing /etc/bind.key failed, delv could assert when trying to parse the built in trust anchors as the parser hadn't been reset. [GL !6468] 5942. [bug] Fix tkey.c:buildquery() function's error handling by adding the missing cleanup code. [GL #3492] 5941. [func] Zones with dnssec-policy now require dynamic DNS or inline-siging to be configured explicitly. [GL #3381] 5936. [bug] Don't enable serve-stale for lookups that error because it is a duplicate query or a query that would be dropped. [GL #2982] To generate a diff of this commit: cvs rdiff -u -r1.46 -r1.47 pkgsrc/net/bind916/Makefile cvs rdiff -u -r1.39 -r1.40 pkgsrc/net/bind916/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1663765127166090 Content-Disposition: inline Content-Length: 1792 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/bind916/Makefile diff -u pkgsrc/net/bind916/Makefile:1.46 pkgsrc/net/bind916/Makefile:1.47 --- pkgsrc/net/bind916/Makefile:1.46 Wed Aug 17 15:38:28 2022 +++ pkgsrc/net/bind916/Makefile Wed Sep 21 12:58:47 2022 @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.46 2022/08/17 15:38:28 taca Exp $ +# $NetBSD: Makefile,v 1.47 2022/09/21 12:58:47 he Exp $ DISTNAME= bind-${BIND_VERSION} PKGNAME= ${DISTNAME:S/-P/pl/} @@ -15,7 +15,7 @@ CONFLICTS+= host-[0-9]* MAKE_JOBS_SAFE= no -BIND_VERSION= 9.16.32 +BIND_VERSION= 9.16.33 BUILD_DEFS+= BIND_DIR VARBASE Index: pkgsrc/net/bind916/distinfo diff -u pkgsrc/net/bind916/distinfo:1.39 pkgsrc/net/bind916/distinfo:1.40 --- pkgsrc/net/bind916/distinfo:1.39 Wed Aug 17 15:38:28 2022 +++ pkgsrc/net/bind916/distinfo Wed Sep 21 12:58:47 2022 @@ -1,8 +1,8 @@ -$NetBSD: distinfo,v 1.39 2022/08/17 15:38:28 taca Exp $ +$NetBSD: distinfo,v 1.40 2022/09/21 12:58:47 he Exp $ -BLAKE2s (bind-9.16.32.tar.xz) = a4188852a2601b1569c6ccd208e3dac46463545dd5484163b2afb6d0ef546ff7 -SHA512 (bind-9.16.32.tar.xz) = 99abedf055901b43e1a85c448ee4c2dd731b7ab77de1454b73c8f9df816aa32262e70e23a8112959d94be990fd4f1c48c36611657ba745670141a7447fd53316 -Size (bind-9.16.32.tar.xz) = 5091860 bytes +BLAKE2s (bind-9.16.33.tar.xz) = 9c1b2de183fa637e8edbf76a008ccd5cd13bc78d3762ffbb3451e38c80c7a481 +SHA512 (bind-9.16.33.tar.xz) = 43fd2cea52dfd1115a4cca83830ab5b93208be401cdbbdff2bbf204b8f0d99fb434ad3156d3a21649488cc904ae09f145feba97b9b6918b0cf063ff5e2b10af5 +Size (bind-9.16.33.tar.xz) = 5092516 bytes SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98 SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8 SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb --_----------=_1663765127166090--