Merge ~ahasenack/ubuntu/+source/bind9:cosmic-bind9-merge-1777935 into ubuntu/+source/bind9:debian/sid

Proposed by Andreas Hasenack
Status: Merged
Merge reported by: Christian Ehrhardt 
Merged at revision: 0dff53cfe1e4f3b6fab2b4d95275540798616abd
Proposed branch: ~ahasenack/ubuntu/+source/bind9:cosmic-bind9-merge-1777935
Merge into: ubuntu/+source/bind9:debian/sid
Diff against target: 403 lines (+315/-5)
4 files modified
debian/bind9.install (+0/-2)
debian/changelog (+312/-0)
debian/control (+2/-2)
debian/rules (+1/-1)
Reviewer Review Type Date Requested Status
Christian Ehrhardt  (community) Approve
Canonical Server Pending
Review via email: mp+348316@code.launchpad.net

This proposal supersedes a proposal from 2018-06-20.

Description of the change

Simple merge, one single delta drop on a security patch that was adopted by debian, one simple delta remains because the package is in universe. This is mostly to exercise the merge muscles and to reduce the work for the next time.

PPA with test packages: https://launchpad.net/~ahasenack/+archive/ubuntu/bind9-merge-1777935/+packages (ppa:ahasenack/bind9-merge-1777935)

To post a comment you must log in.
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

- git ubuntu Linting is good
- upgrade of the package from ppa is good
- qa regression tests - ok
- source build - ok
- lint on built source has no new errors - ok

Also it really ia minor bump, essentially the CVE moves from Ubuntu to Debian and that is it.
This is close to not necessary, looking back I guess some of my testing was not even needed :-)

LGTM

review: Approve
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Indeed, but still good to check that the delta drop didn't inadvertently drop the CVE patch :)

Thanks for the review, could you please push the upload tag and sponsor?

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Tagged, Pushed and sponsored.
Please track migration as usual.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
diff --git a/debian/bind9.install b/debian/bind9.install
index 26d595e..fd7f0f5 100644
--- a/debian/bind9.install
+++ b/debian/bind9.install
@@ -16,7 +16,6 @@ usr/sbin/genrandom
16usr/sbin/isc-hmac-fixup16usr/sbin/isc-hmac-fixup
17usr/sbin/named17usr/sbin/named
18usr/sbin/named-journalprint18usr/sbin/named-journalprint
19usr/sbin/named-nzd2nzf
20usr/sbin/named-pkcs1119usr/sbin/named-pkcs11
21usr/sbin/nsec3hash20usr/sbin/nsec3hash
22usr/sbin/tsig-keygen21usr/sbin/tsig-keygen
@@ -32,7 +31,6 @@ usr/share/man/man8/dnssec-importkey.8
32usr/share/man/man8/genrandom.831usr/share/man/man8/genrandom.8
33usr/share/man/man8/isc-hmac-fixup.832usr/share/man/man8/isc-hmac-fixup.8
34usr/share/man/man8/named-journalprint.833usr/share/man/man8/named-journalprint.8
35usr/share/man/man8/named-nzd2nzf.8
36usr/share/man/man8/named.834usr/share/man/man8/named.8
37usr/share/man/man8/nsec3hash.835usr/share/man/man8/nsec3hash.8
38usr/share/man/man8/tsig-keygen.836usr/share/man/man8/tsig-keygen.8
diff --git a/debian/changelog b/debian/changelog
index 498470f..a4d3f9d 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,16 @@
1bind9 (1:9.11.3+dfsg-2ubuntu1) cosmic; urgency=medium
2
3 * Merge with Debian unstable (LP: #1777935). Remaining changes:
4 - Build without lmdb support as that package is in Universe
5 * Drop:
6 - SECURITY UPDATE: improperly permits recursive query service
7 + debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling
8 in bin/named/server.c.
9 + CVE-2018-5738
10 [Applied in Debian's 1:9.11.3+dfsg-2]
11
12 -- Andreas Hasenack <andreas@canonical.com> Wed, 20 Jun 2018 17:42:16 -0300
13
1bind9 (1:9.11.3+dfsg-2) unstable; urgency=medium14bind9 (1:9.11.3+dfsg-2) unstable; urgency=medium
215
3 * [CVE-2018-5738]: Add upstream fix to close the default open recursion16 * [CVE-2018-5738]: Add upstream fix to close the default open recursion
@@ -6,6 +19,24 @@ bind9 (1:9.11.3+dfsg-2) unstable; urgency=medium
619
7 -- Ondřej Surý <ondrej@debian.org> Thu, 14 Jun 2018 13:01:47 +000020 -- Ondřej Surý <ondrej@debian.org> Thu, 14 Jun 2018 13:01:47 +0000
821
22bind9 (1:9.11.3+dfsg-1ubuntu2) cosmic; urgency=medium
23
24 * SECURITY UPDATE: improperly permits recursive query service
25 - debian/patches/CVE-2018-5738.patch: fix configure_view_acl() handling
26 in bin/named/server.c.
27 - CVE-2018-5738
28
29 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 11 Jun 2018 09:41:51 -0400
30
31bind9 (1:9.11.3+dfsg-1ubuntu1) bionic; urgency=low
32
33 * New upstream release. (LP: #1763572)
34 - fix a crash when configured with ipa-dns-install
35 * Merge from Debian unstable. Remaining changes:
36 - Build without lmdb support as that package is in Universe
37
38 -- Timo Aaltonen <tjaalton@debian.org> Fri, 13 Apr 2018 07:40:47 +0300
39
9bind9 (1:9.11.3+dfsg-1) unstable; urgency=medium40bind9 (1:9.11.3+dfsg-1) unstable; urgency=medium
1041
11 [ Bernhard Schmidt ]42 [ Bernhard Schmidt ]
@@ -30,6 +61,61 @@ bind9 (1:9.11.3+dfsg-1) unstable; urgency=medium
3061
31 -- Bernhard Schmidt <berni@debian.org> Fri, 23 Mar 2018 00:09:58 +010062 -- Bernhard Schmidt <berni@debian.org> Fri, 23 Mar 2018 00:09:58 +0100
3263
64bind9 (1:9.11.2.P1-1ubuntu5) bionic; urgency=medium
65
66 * debian/patches/nsupdate-gssapi-fails-ad-45854.patch: fix updating
67 DNS records in Microsoft AD using GSSAPI. Thanks to Mark Andrews
68 <marka@isc.org>. (LP: #1755439)
69
70 -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Mar 2018 09:38:46 -0300
71
72bind9 (1:9.11.2.P1-1ubuntu4) bionic; urgency=medium
73
74 * Fix apparmor profile filename (LP: #1754981)
75
76 -- Andreas Hasenack <andreas@canonical.com> Thu, 15 Mar 2018 10:06:57 -0300
77
78bind9 (1:9.11.2.P1-1ubuntu3) bionic; urgency=high
79
80 * No change rebuild against openssl1.1.
81
82 -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 06 Feb 2018 12:14:22 +0000
83
84bind9 (1:9.11.2.P1-1ubuntu2) bionic; urgency=medium
85
86 * Build without lmdb support as that package is in Universe (LP: #1746296)
87 - d/control: remove Build-Depends on liblmdb-dev
88 - d/rules: configure --without-lmdb
89 - d/bind9.install: drop named-nzd2nzf and named-nzd2nzf.8 as it requires
90 lmdb.
91
92 -- Andreas Hasenack <andreas@canonical.com> Tue, 30 Jan 2018 15:21:23 -0200
93
94bind9 (1:9.11.2.P1-1ubuntu1) bionic; urgency=medium
95
96 * Merge with Debian unstable (LP: #1744930).
97 * Drop:
98 - Add RemainAfterExit to bind9-resolvconf unit configuration file
99 (LP #1536181).
100 [fixed in 1:9.10.6+dfsg-4]
101 - rules: Fix path to libsofthsm2.so. (LP #1685780)
102 [adopted in 1:9.10.6+dfsg-5]
103 - d/p/CVE-2016-8864-regression-test.patch: tests for the regression
104 introduced with the CVE-2016-8864.patch and fixed in
105 CVE-2016-8864-regression.patch.
106 [applied upstream]
107 - d/p/CVE-2016-8864-regression2-test.patch: tests for the second
108 regression (RT #44318) introduced with the CVE-2016-8864.patch
109 and fixed in CVE-2016-8864-regression2.patch.
110 [applied upstream]
111 - d/control, d/rules: add json support for the statistics channels.
112 (LP #1669193)
113 [adopted in 1:9.10.6+dfsg-5]
114 * d/p/add-ply-dependency-to-python-scripts.patch: setup.py is missing
115 listing the python ply module as a dependency (Closes: #888463)
116
117 -- Andreas Hasenack <andreas@canonical.com> Fri, 26 Jan 2018 11:20:33 -0200
118
33bind9 (1:9.11.2.P1-1) unstable; urgency=medium119bind9 (1:9.11.2.P1-1) unstable; urgency=medium
34120
35 * New upstream version 9.11.2-P1121 * New upstream version 9.11.2-P1
@@ -205,6 +291,140 @@ bind9 (1:9.10.6+dfsg-1) unstable; urgency=medium
205291
206 -- Ondřej Surý <ondrej@debian.org> Fri, 06 Oct 2017 06:18:21 +0000292 -- Ondřej Surý <ondrej@debian.org> Fri, 06 Oct 2017 06:18:21 +0000
207293
294bind9 (1:9.10.3.dfsg.P4-12.6ubuntu1) artful; urgency=medium
295
296 * Merge with Debian unstable (LP: #1712920). Remaining changes:
297 - Add RemainAfterExit to bind9-resolvconf unit configuration file
298 (LP #1536181).
299 - rules: Fix path to libsofthsm2.so. (LP #1685780)
300 - d/p/CVE-2016-8864-regression-test.patch: tests for the regression
301 introduced with the CVE-2016-8864.patch and fixed in
302 CVE-2016-8864-regression.patch.
303 - d/p/CVE-2016-8864-regression2-test.patch: tests for the second
304 regression (RT #44318) introduced with the CVE-2016-8864.patch
305 and fixed in CVE-2016-8864-regression2.patch.
306 - d/control, d/rules: add json support for the statistics channels.
307 (LP #1669193)
308
309 -- Andreas Hasenack <andreas@canonical.com> Thu, 24 Aug 2017 18:28:00 -0300
310
311bind9 (1:9.10.3.dfsg.P4-12.6) unstable; urgency=medium
312
313 * Non-maintainer upload.
314 * Import upcoming DNSSEC KSK-2017 from 9.10.5 (Closes: #860794)
315
316 -- Bernhard Schmidt <berni@debian.org> Fri, 11 Aug 2017 19:10:07 +0200
317
318bind9 (1:9.10.3.dfsg.P4-12.5ubuntu1) artful; urgency=medium
319
320 * Merge with Debian unstable (LP: #1701687). Remaining changes:
321 - Add RemainAfterExit to bind9-resolvconf unit configuration file
322 (LP #1536181).
323 - rules: Fix path to libsofthsm2.so. (LP #1685780)
324 * Drop:
325 - SECURITY UPDATE: denial of service via assertion failure
326 + debian/patches/CVE-2016-2776.patch: properly handle lengths in
327 lib/dns/message.c.
328 + CVE-2016-2776
329 + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
330 - SECURITY UPDATE: assertion failure via class mismatch
331 + debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
332 records in lib/dns/resolver.c.
333 + CVE-2016-9131
334 + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
335 - SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
336 + debian/patches/CVE-2016-9147.patch: fix logic when records are
337 returned without the requested data in lib/dns/resolver.c.
338 + CVE-2016-9147
339 + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
340 - SECURITY UPDATE: assertion failure via unusually-formed DS record
341 + debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
342 lib/dns/message.c, lib/dns/resolver.c.
343 + CVE-2016-9444
344 + [Fixed in Debian 1:9.10.3.dfsg.P4-11]
345 - SECURITY UPDATE: regression in CVE-2016-8864
346 + debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
347 responses in lib/dns/resolver.c, added tests to
348 bin/tests/system/dname/ns2/example.db,
349 bin/tests/system/dname/tests.sh.
350 + No CVE number
351 + [Fixed in Debian 1:9.10.3.dfsg.P4-11 and 1:9.10.3.dfsg.P4-12]
352 - SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
353 a NULL pointer
354 + debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
355 combination in bin/named/query.c, lib/dns/message.c,
356 lib/dns/rdataset.c.
357 + CVE-2017-3135
358 + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
359 - SECURITY UPDATE: regression in CVE-2016-8864
360 + debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
361 was still being cached when it should have been in lib/dns/resolver.c,
362 added tests to bin/tests/system/dname/ans3/ans.pl,
363 bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
364 + No CVE number
365 + [Fixed in Debian 1:9.10.3.dfsg.P4-12]
366 - SECURITY UPDATE: Denial of Service due to an error handling
367 synthesized records when using DNS64 with "break-dnssec yes;"
368 + debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
369 called.
370 + CVE-2017-3136
371 + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
372 - SECURITY UPDATE: Denial of Service due to resolver terminating when
373 processing a response packet containing a CNAME or DNAME
374 + debian/patches/CVE-2017-3137.patch: don't expect a specific
375 ordering of answer components; add testcases.
376 + CVE-2017-3137
377 + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3 with 3 patch files]
378 - SECURITY UPDATE: Denial of Service when receiving a null command on
379 the control channel
380 + debian/patches/CVE-2017-3138.patch: don't throw an assert if no
381 command token is given; add testcase.
382 + CVE-2017-3138
383 + [Fixed in Debian 1:9.10.3.dfsg.P4-12.3]
384 - SECURITY UPDATE: TSIG authentication issues
385 + debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
386 lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
387 + CVE-2017-3142
388 + CVE-2017-3143
389 + [Fixed in Debian 1:9.10.3.dfsg.P4-12.4]
390 * d/p/CVE-2016-8864-regression-test.patch: tests for the regression
391 introduced with the CVE-2016-8864.patch and fixed in
392 CVE-2016-8864-regression.patch.
393 * d/p/CVE-2016-8864-regression2-test.patch: tests for the second
394 regression (RT #44318) introduced with the CVE-2016-8864.patch
395 and fixed in CVE-2016-8864-regression2.patch.
396 * d/control, d/rules: add json support for the statistics channels.
397 (LP: #1669193)
398
399 -- Andreas Hasenack <andreas@canonical.com> Fri, 11 Aug 2017 17:12:09 -0300
400
401bind9 (1:9.10.3.dfsg.P4-12.5) unstable; urgency=medium
402
403 * Non-maintainer upload.
404 * Change to fix CVE-2017-3142 and CVE-2017-3143 broke verification of TSIG
405 signed TCP message sequences where not all the messages contain TSIG
406 records. These may be used in AXFR and IXFR responses.
407 (Closes: #868952)
408
409 -- Salvatore Bonaccorso <carnil@debian.org> Fri, 21 Jul 2017 22:28:32 +0200
410
411bind9 (1:9.10.3.dfsg.P4-12.4) unstable; urgency=high
412
413 * Non-maintainer upload.
414
415 [ Yves-Alexis Perez ]
416 * debian/patches:
417 - debian/patches/CVE-2017-3142+CVE-2017-3143 added, fix TSIG bypasses
418 CVE-2017-3142: error in TSIG authentication can permit unauthorized zone
419 transfers. An attacker may be able to circumvent TSIG authentication of
420 AXFR and Notify requests.
421 CVE-2017-3143: error in TSIG authentication can permit unauthorized
422 dynamic updates. An attacker may be able to forge a valid TSIG or SIG(0)
423 signature for a dynamic update.
424 (Closes: #866564)
425
426 -- Salvatore Bonaccorso <carnil@debian.org> Sun, 16 Jul 2017 22:13:21 +0200
427
208bind9 (1:9.10.3.dfsg.P4-12.3+deb9u3) stretch; urgency=medium428bind9 (1:9.10.3.dfsg.P4-12.3+deb9u3) stretch; urgency=medium
209429
210 [ Bernhard Schmidt ]430 [ Bernhard Schmidt ]
@@ -311,6 +531,98 @@ bind9 (1:9.10.3.dfsg.P4-11) unstable; urgency=medium
311531
312 -- Michael Gilbert <mgilbert@debian.org> Thu, 19 Jan 2017 04:03:28 +0000532 -- Michael Gilbert <mgilbert@debian.org> Thu, 19 Jan 2017 04:03:28 +0000
313533
534bind9 (1:9.10.3.dfsg.P4-10.1ubuntu7) artful; urgency=medium
535
536 * SECURITY UPDATE: TSIG authentication issues
537 - debian/patches/CVE-2017-3042,3043.patch: fix TSIG logic in
538 lib/dns/dnssec.c, lib/dns/message.c, lib/dns/tsig.c.
539 - CVE-2017-3142
540 - CVE-2017-3143
541
542 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 03 Jul 2017 09:48:13 -0400
543
544bind9 (1:9.10.3.dfsg.P4-10.1ubuntu6) artful; urgency=medium
545
546 * rules: Fix path to libsofthsm2.so. (LP: #1685780)
547
548 -- Timo Aaltonen <tjaalton@debian.org> Mon, 24 Apr 2017 15:01:30 +0300
549
550bind9 (1:9.10.3.dfsg.P4-10.1ubuntu5) zesty-security; urgency=medium
551
552 * SECURITY UPDATE: Denial of Service due to an error handling
553 synthesized records when using DNS64 with "break-dnssec yes;"
554 - debian/patches/CVE-2017-3136.patch: reset noqname if query_dns64()
555 called.
556 - CVE-2017-3136
557 * SECURITY UPDATE: Denial of Service due to resolver terminating when
558 processing a response packet containing a CNAME or DNAME
559 - debian/patches/CVE-2017-3137.patch: don't expect a specific
560 ordering of answer components; add testcases.
561 - CVE-2017-3137
562 * SECURITY UPDATE: Denial of Service when receiving a null command on
563 the control channel
564 - debian/patches/CVE-2017-3138.patch: don't throw an assert if no
565 command token is given; add testcase.
566 - CVE-2017-3138
567
568 -- Steve Beattie <sbeattie@ubuntu.com> Wed, 12 Apr 2017 01:32:15 -0700
569
570bind9 (1:9.10.3.dfsg.P4-10.1ubuntu4) zesty; urgency=medium
571
572 * SECURITY UPDATE: Combining dns64 and rpz can result in dereferencing
573 a NULL pointer
574 - debian/patches/CVE-2017-3135.patch: properly handle dns64 and rpz
575 combination in bin/named/query.c, lib/dns/message.c,
576 lib/dns/rdataset.c.
577 - CVE-2017-3135
578 * SECURITY UPDATE: regression in CVE-2016-8864
579 - debian/patches/rt44318.patch: synthesised CNAME before matching DNAME
580 was still being cached when it should have been in lib/dns/resolver.c,
581 added tests to bin/tests/system/dname/ans3/ans.pl,
582 bin/tests/system/dname/ns1/root.db, bin/tests/system/dname/tests.sh.
583 - No CVE number
584
585 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 15 Feb 2017 09:37:39 -0500
586
587bind9 (1:9.10.3.dfsg.P4-10.1ubuntu3) zesty; urgency=medium
588
589 * SECURITY UPDATE: assertion failure via class mismatch
590 - debian/patches/CVE-2016-9131.patch: properly handle certain TKEY
591 records in lib/dns/resolver.c.
592 - CVE-2016-9131
593 * SECURITY UPDATE: assertion failure via inconsistent DNSSEC information
594 - debian/patches/CVE-2016-9147.patch: fix logic when records are
595 returned without the requested data in lib/dns/resolver.c.
596 - CVE-2016-9147
597 * SECURITY UPDATE: assertion failure via unusually-formed DS record
598 - debian/patches/CVE-2016-9444.patch: handle missing RRSIGs in
599 lib/dns/message.c, lib/dns/resolver.c.
600 - CVE-2016-9444
601 * SECURITY UPDATE: regression in CVE-2016-8864
602 - debian/patches/rt43779.patch: properly handle CNAME -> DNAME in
603 responses in lib/dns/resolver.c, added tests to
604 bin/tests/system/dname/ns2/example.db,
605 bin/tests/system/dname/tests.sh.
606 - No CVE number
607
608 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 25 Jan 2017 09:28:10 -0500
609
610bind9 (1:9.10.3.dfsg.P4-10.1ubuntu2) zesty; urgency=medium
611
612 * Add RemainAfterExit to bind9-resolvconf unit configuration file
613 (LP: #1536181).
614
615 -- Nishanth Aravamudan <nish.aravamudan@canonical.com> Tue, 15 Nov 2016 08:24:58 -0800
616
617bind9 (1:9.10.3.dfsg.P4-10.1ubuntu1) yakkety; urgency=medium
618
619 * SECURITY UPDATE: denial of service via assertion failure
620 - debian/patches/CVE-2016-2776.patch: properly handle lengths in
621 lib/dns/message.c.
622 - CVE-2016-2776
623
624 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 04 Oct 2016 14:31:17 -0400
625
314bind9 (1:9.10.3.dfsg.P4-10.1) unstable; urgency=medium626bind9 (1:9.10.3.dfsg.P4-10.1) unstable; urgency=medium
315627
316 * Non-maintainer upload.628 * Non-maintainer upload.
diff --git a/debian/control b/debian/control
index 32ab301..ebe3509 100644
--- a/debian/control
+++ b/debian/control
@@ -1,7 +1,8 @@
1Source: bind91Source: bind9
2Section: net2Section: net
3Priority: optional3Priority: optional
4Maintainer: BIND 9 Package <bind9@package.debian.org>4Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
5XSBC-Original-Maintainer: BIND 9 Package <bind9@package.debian.org>
5Uploaders: LaMont Jones <lamont@debian.org>,6Uploaders: LaMont Jones <lamont@debian.org>,
6 Michael Gilbert <mgilbert@debian.org>,7 Michael Gilbert <mgilbert@debian.org>,
7 Robie Basak <robie.basak@canonical.com>,8 Robie Basak <robie.basak@canonical.com>,
@@ -19,7 +20,6 @@ Build-Depends: bison,
19 libjson-c-dev,20 libjson-c-dev,
20 libkrb5-dev,21 libkrb5-dev,
21 libldap2-dev,22 libldap2-dev,
22 liblmdb-dev,
23 libssl-dev,23 libssl-dev,
24 libtool,24 libtool,
25 libxml2-dev,25 libxml2-dev,
diff --git a/debian/rules b/debian/rules
index f1d6823..40a5097 100755
--- a/debian/rules
+++ b/debian/rules
@@ -80,7 +80,7 @@ override_dh_auto_configure:
80 --with-openssl=/usr \80 --with-openssl=/usr \
81 --with-gssapi=/usr \81 --with-gssapi=/usr \
82 --with-libjson=/usr \82 --with-libjson=/usr \
83 --with-lmdb=/usr \83 --without-lmdb \
84 --with-gnu-ld \84 --with-gnu-ld \
85 --with-geoip=/usr \85 --with-geoip=/usr \
86 --with-atf=no \86 --with-atf=no \

Subscribers

People subscribed via source and target branches