[Bug 239850] dns/powerdns: Update to 4.1.13 (Fixes security vulnerability)

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Aug 14 12:24:09 UTC 2019


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=239850

            Bug ID: 239850
           Summary: dns/powerdns: Update to 4.1.13 (Fixes security
                    vulnerability)
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs at FreeBSD.org
          Reporter: tremere at cainites.net

Created attachment 206533
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=206533&action=edit
Update to PowerDNS Auhoritative Server 4.1.13

4.1.13 changelog:

The 4.1.12 release was skipped due to a packaging issue.

This is a bugfix release for high traffic setups using the pipebackend or
remotebackend. It contains the following changes:

gpgsqlbackend: add missing schema file to Makefile (#8157)
stop using select() in places where FDs can be >1023 (#8162)

4.1.11 changelog:

This release contains the updated PostgreSQL schema for PowerDNS Security
Advisory 2019-06 (CVE-2019-10203).

Upgrading is not enough - you need to manually apply the schema change: ALTER
TABLE domains ALTER notified_serial TYPE bigint USING CASE WHEN notified_serial
>= 0 THEN notified_serial::bigint END;

======
I've added a pkg-install file with a 10s delay which essentially says the same
as mentioned in the 4.1.11 changelog. Since this is the first time a schema
change is required to fix a security vulnerability I hope this is the best way
to do it. If not... I'm ready to be educated :)
======

QA:
portlint: OK (looks fine.)
testport: OK (12.0, amd64)

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list