[Bug 239850] dns/powerdns: Update to 4.1.13 (Fixes security vulnerability)
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Aug 14 12:24:09 UTC 2019
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=239850
Bug ID: 239850
Summary: dns/powerdns: Update to 4.1.13 (Fixes security
vulnerability)
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Many People
Priority: ---
Component: Individual Port(s)
Assignee: ports-bugs at FreeBSD.org
Reporter: tremere at cainites.net
Created attachment 206533
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=206533&action=edit
Update to PowerDNS Auhoritative Server 4.1.13
4.1.13 changelog:
The 4.1.12 release was skipped due to a packaging issue.
This is a bugfix release for high traffic setups using the pipebackend or
remotebackend. It contains the following changes:
gpgsqlbackend: add missing schema file to Makefile (#8157)
stop using select() in places where FDs can be >1023 (#8162)
4.1.11 changelog:
This release contains the updated PostgreSQL schema for PowerDNS Security
Advisory 2019-06 (CVE-2019-10203).
Upgrading is not enough - you need to manually apply the schema change: ALTER
TABLE domains ALTER notified_serial TYPE bigint USING CASE WHEN notified_serial
>= 0 THEN notified_serial::bigint END;
======
I've added a pkg-install file with a 10s delay which essentially says the same
as mentioned in the 4.1.11 changelog. Since this is the first time a schema
change is required to fix a security vulnerability I hope this is the best way
to do it. If not... I'm ready to be educated :)
======
QA:
portlint: OK (looks fine.)
testport: OK (12.0, amd64)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list