pkgsrc/net/bind911/patches/patch-lib_lwres_getnameinfo.c
taca 3f12dc03ae net/bind911: update to 9.11.6pl1
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

Fix security problem CVE-2018-5743 and overhaul pkgsrc.  Now no need
to change namedb is permission under NetBSD.

* Update note about required directories.
* Drop pkg-config from USE_TOOLS.
* Drop none existing configure arguments and PKG_OPTIONS:
	- fetchlimit
	- sit

	--- 9.11.6-P1 released ---

5200.	[security]	tcp-clients settings could be exceeded in some cases,
			which could lead to exhaustion of file descriptors.
			(CVE-2018-5743) [GL #615]
2019-04-30 02:51:38 +00:00

34 lines
915 B
C

$NetBSD: patch-lib_lwres_getnameinfo.c,v 1.2 2019/04/30 02:51:38 taca Exp $
* Add fix for KAME based implementation.
--- lib/lwres/getnameinfo.c.orig 2019-02-27 23:28:15.000000000 +0000
+++ lib/lwres/getnameinfo.c
@@ -116,6 +116,10 @@
#include <lwres/netdb.h>
#include "print_p.h"
+#ifdef __KAME__
+#include <net/if.h>
+#endif
+
#include "assert_p.h"
#include "unreachable_p.h"
@@ -268,13 +272,9 @@ lwres_getnameinfo(const struct sockaddr
((const struct sockaddr_in6 *)sa)->sin6_scope_id) {
char *p = numaddr + strlen(numaddr);
const char *stringscope = NULL;
-#if 0
- if ((flags & NI_NUMERICSCOPE) == 0) {
- /*
- * Vendors may want to add support for
- * non-numeric scope identifier.
- */
- stringscope = foo;
+#ifdef __KAME__
+ stringscope = if_indextoname(
+ ((const struct sockaddr_in6 *)sa)->sin6_scope_id);
}
#endif
if (stringscope == NULL) {