Hi,
Centos 4.4 comes with bind 9.2.x. I want to upgrade it to bind bind-9.3.3-9.x as bind 9.2.x had a security hole. So I downloaded bind-9.3.3-9.0.1.el5.src.rpm from Centos5 repo and tried to built RPM out of it. But, I failed to do it.
I got bellow errors.
./dbus_service.c: In function `dbus_svc_send_va': ./dbus_service.c:296: warning: implicit declaration of function `dbus_message_iter_init_append' ./dbus_service.c:298: warning: implicit declaration of function `dbus_message_iter_append_basic' ./dbus_service.c: In function `dbus_svc_message_iterator_new': ./dbus_service.c:497: warning: wrong type argument to increment ./dbus_service.c: In function `dbus_svc_message_next_arg_type': ./dbus_service.c:513: warning: wrong type argument to increment ./dbus_service.c: In function `dbus_svc_message_next_arg': ./dbus_service.c:521: warning: wrong type argument to increment ./dbus_service.c:522: warning: implicit declaration of function `dbus_message_iter_get_basic' ./dbus_service.c: In function `dbus_svc_message_element_type': ./dbus_service.c:530: warning: wrong type argument to increment ./dbus_service.c:531: warning: implicit declaration of function `dbus_message_iter_get_element_type' ./dbus_service.c: In function `dbus_svc_message_get_elements': ./dbus_service.c:538: warning: wrong type argument to increment ./dbus_service.c:539: warning: implicit declaration of function `dbus_message_iter_get_fixed_array' ./dbus_service.c: In function `dbus_svc_message_iterator_free': ./dbus_service.c:545: warning: wrong type argument to increment ./dbus_service.c: In function `dbus_svc_init': ./dbus_service.c:1015: warning: implicit declaration of function `dbus_connection_open_private' ./dbus_service.c:1015: warning: assignment makes pointer from integer without a cast ./dbus_service.c:1024: warning: implicit declaration of function `dbus_connection_close' ./dbus_service.c:1039: warning: assignment makes pointer from integer without a cast ./dbus_service.c:1080: warning: implicit declaration of function `dbus_bus_get_unique_name' ./dbus_service.c:1080: warning: assignment makes pointer from integer without a cast ./dbus_service.c:1084: warning: implicit declaration of function `dbus_bus_request_name' ./dbus_service.c:1094: error: `DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER' undeclared (first use in this function) ./dbus_service.c:1094: error: (Each undeclared identifier is reported only once ./dbus_service.c:1094: error: for each function it appears in.) ./dbus_service.c:1096: error: `DBUS_REQUEST_NAME_REPLY_EXISTS' undeclared (first use in this function) ./dbus_service.c:1097: error: `DBUS_REQUEST_NAME_REPLY_IN_QUEUE' undeclared (first use in this function) ./dbus_service.c:1098: error: `DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER' undeclared (first use in this function) make[2]: *** [dbus_service.o] Error 1 make[2]: Leaving directory `/usr/src/redhat/BUILD/bind-9.3.3rc2/bin/named' make[1]: *** [subdirs] Error 1 make[1]: Leaving directory `/usr/src/redhat/BUILD/bind-9.3.3rc2/bin' make: *** [subdirs] Error 1 error: Bad exit status from /var/tmp/rpm-tmp.78789 (%build)
RPM build errors: Bad exit status from /var/tmp/rpm-tmp.78789 (%build)
ANY IDEAS?
Has anybody built ?
On 10/22/07, Ralph Angenendt ra+centos@br-online.de wrote:
Indunil Jayasooriya wrote:
Hi, Centos 4.4 comes with bind 9.2.x. I want to upgrade it to
bind
bind-9.3.3-9.x as bind 9.2.x had a security hole.
Which one which isn't fixed in bind-9.2.4-27.0.1.el4?
Thanks for your quick respone.
pls see below URL.
http://www.net-security.org/secworld.php?id=5366
We discussed about it in this list. see below URLs
http://lists.centos.org/pipermail/centos/2007-July/084180.html
http://lists.centos.org/pipermail/centos/2007-July/084186.html
Indunil Jayasooriya wrote:
On 10/22/07, Ralph Angenendt <[1]ra+centos@br-online.de > wrote:
Indunil Jayasooriya wrote: > > Hi, > Centos 4.4 comes with bind 9.2.x. I want to upgrade it to bind > bind-9.3.3-9.x as bind 9.2.x had a security hole. Which one which isn't fixed in bind-9.2.4-27.0.1.el4?
Thanks for your quick respone. pls see below URL. [2]http://www.net-security.org/secworld.php?id=5366
[admin@juwel ~]$ rpm -q --changelog bind-libs|grep CVE - fixed cryptographically weak query id generator (CVE-2007-2926)
So that has been fixed, as you have been told on Jul 25th. Why bring that up again?
And please refrain from answering to the list *and* to me. I read this list and answer here.
Cheers,
Ralph
[admin@juwel ~]$ rpm -q --changelog bind-libs|grep CVE
- fixed cryptographically weak query id generator (CVE-2007-2926)
So that has been fixed, as you have been told on Jul 25th. Why bring that up again?
Really sorry.
I also checked. pls see below.
[root@mailgw named]# rpm -q --changelog bind-libs|grep CVE - added fix for #225222: CVE-2007-0494 BIND dnssec denial of service
--
Thank you Indunil Jayasooriya
Indunil Jayasooriya wrote:
[admin@juwel ~]$ rpm -q --changelog bind-libs|grep CVE
- fixed cryptographically weak query id generator (CVE-2007-2926) So that has been fixed, as you have been told on Jul 25th. Why bring that up again?
Really sorry. I also checked. pls see below. [root@mailgw named]# rpm -q --changelog bind-libs|grep CVE
- added fix for #225222: CVE-2007-0494 BIND dnssec denial of service
So which version of bind is that? Did you update it?
Ralph
On 10/22/07, Ralph Angenendt ra+centos@br-online.de wrote:
Indunil Jayasooriya wrote:
[admin@juwel ~]$ rpm -q --changelog bind-libs|grep CVE
- fixed cryptographically weak query id generator (CVE-2007-2926) So that has been fixed, as you have been told on Jul 25th. Why
bring
that up again?
Really sorry. I also checked. pls see below. [root@mailgw named]# rpm -q --changelog bind-libs|grep CVE
- added fix for #225222: CVE-2007-0494 BIND dnssec denial of service
So which version of bind is that?
[root@mailgw named]# rpm -qa |grep bind
bind-utils-9.2.4-24.EL4 bind-libs-9.2.4-24.EL4 bind-9.2.4-24.EL4 bind-chroot-9.2.4-24.EL4
Did you update it?
I now checked. the below are the latest @ CentOS 4 branch. I am going to update to the below.
http://isoredirect.centos.org/centos/4/updates/i386/RPMS/bind-9.2.4-27.0.1.e... http://isoredirect.centos.org/centos/4/updates/i386/RPMS/bind-chroot-9.2.4-2... http://isoredirect.centos.org/centos/4/updates/i386/RPMS/bind-libs-9.2.4-27.... http://isoredirect.centos.org/centos/4/updates/i386/RPMS/bind-utils-9.2.4-27...
Indunil Jayasooriya wrote:
On 10/22/07, Ralph Angenendt <[1]ra+centos@br-online.de> wrote: So which version of bind is that?
[root@mailgw named]# rpm -qa |grep bind bind-utils-9.2.4-24.EL4 bind-libs-9.2.4-24.EL4 bind-9.2.4-24.EL4 bind-chroot-9.2.4-24.EL4
Did you update it? I now checked. the below are the latest @ CentOS 4 branch. I am going to update to the below.
NO. It is not. The latest ones are the ones below. So you haven't run a single "yum update" since you installed the box but are worried about a bind malfunction, which is nasty, but not a very critical one, while missing loads of security related updates since then?
[2]http://isoredirect.centos.org/centos/4/updates/i386/RPMS/bind-9.2.4-27.0. 1.el4.i386.rpm
Yes. And a *simple* yum update would have fetched those for you nearly three months ago!
Ralph
PS: STOP SENDING ME OFF LIST COPIES. I read here.
On Mon, 22 Oct 2007, Indunil Jayasooriya wrote:
On 10/22/07, Ralph Angenendt ra+centos@br-online.de wrote:
Indunil Jayasooriya wrote:
Hi, Centos 4.4 comes with bind 9.2.x. I want to upgrade it to
bind
bind-9.3.3-9.x as bind 9.2.x had a security hole.
Which one which isn't fixed in bind-9.2.4-27.0.1.el4?
Thanks for your quick respone.
pls see below URL.
http://www.net-security.org/secworld.php?id=5366
We discussed about it in this list. see below URLs
http://lists.centos.org/pipermail/centos/2007-July/084180.html http://lists.centos.org/pipermail/centos/2007-July/084186.html
Indunil,
The correct solution to deal with this security issue is to update to the latest bind of CentOS 4, which already provided a backported fix for this problem in CentOS 4.
By rebuilding a package of CentOS 5 and running it on CentOS 4, you will no longer receive automatically any new security fixes from CentOS 4. Because you have manually upgraded your CentOS 4 bind to a newer version than Red Hat supports.
As a consequence of your actions, you will have to rebuild *every* bind release from CentOS 5 on your CentOS 4 box yourself. For no real good reason.
On 10/22/07, Dag Wieers dag@centos.org wrote:
On Mon, 22 Oct 2007, Indunil Jayasooriya wrote:
Indunil,
The correct solution to deal with this security issue is to update to the latest bind of CentOS 4, which already provided a backported fix for this problem in CentOS 4.
Thanks. I got it.
By rebuilding a package of CentOS 5 and running it on CentOS 4, you will
no longer receive automatically any new security fixes from CentOS 4. Because you have manually upgraded your CentOS 4 bind to a newer version than Red Hat supports.
Yeah, I agree with you. So I stopped rebuilding it.
As a consequence of your actions, you will have to rebuild *every* bind
release from CentOS 5 on your CentOS 4 box yourself. For no real good reason.
U r right.
Thanks very much for your info.
On Mon, Oct 22, 2007 at 02:33:16PM +0530, Indunil Jayasooriya wrote:
Hi,
Centos 4.4 comes with bind 9.2.x. I want to upgrade it to bind
Make yourself a favor and 'yum update' instead of trying to break your CentOS-4 by adding CentOS-5 packages.
Current CentOS-4 is 4.5 with bind-libs-9.2.4-27.0.1.el4.i386
Tru