Accepting request 332971 from home:msmeissn:branches:network

- Update to version 9.10.2-P4
  * An incorrect boundary boundary check in the OPENPGPKEY
    rdatatype could trigger an assertion failure.
    (CVE-2015-5986) [RT #40286] (bsc#944107)
  * A buffer accounting error could trigger an
    assertion failure when parsing certain malformed 
    DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)

OBS-URL: https://build.opensuse.org/request/show/332971
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=176
This commit is contained in:
Lars Müller 2015-09-22 20:15:47 +00:00 committed by Git OBS Bridge
parent f94eebf621
commit f17cebd7c5
7 changed files with 31 additions and 19 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:78079a66dda455ffecfe93ef72d1ffc947f17b1c453d55ec06b860b49a5e1d4a
size 8469831

View File

@ -1,11 +0,0 @@
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
iQEcBAABAgAGBQJVrSxkAAoJEG+m68mRGkwC/MgIAJajjc2WhbJ+MKtLB0JughkZ
YLykCptyAz5YD4Uit5GWEkTqJbTqap7scfLCQiqQHYfUBfHwZ3BYtw6HHmeGZmjC
oivNB6zHKVKAc9YDWkVDMbc9zXFxApKsdyU5YKs5vEW9ByxyMtaCTzU4+nRnDRLJ
pwlACuHeSKmMel3n4Wa/5ECPgiUEdi+nFXMq/O70yCzB4WDD6YVP9MsFYlXfvxiv
EdJ2Zr9m53VNOJOKmC7ipGca48CYcdM67rW+/XnMCHqZT9gZcfdUGO9l4qzodAUx
Hd6wj9kSMVe3hJ7bz/Z/Da+Jlsu8seu9aqaQUkJq28TY5wS7JjauK2c1MhTKcKo=
=9qke
-----END PGP SIGNATURE-----

3
bind-9.10.2-P4.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:c00b21ec1def212957f28efe9d10aac52d6ec515e84fbf2c42143f5d71429cb8
size 8471531

11
bind-9.10.2-P4.tar.gz.asc Normal file
View File

@ -0,0 +1,11 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (NetBSD)
iQEcBAABAgAGBQJV04QTAAoJEG+m68mRGkwCRvYH/19oF+kkXzg9V9Sdd2qrjrYf
PuFQQnEcP4Eodk+10i4AvW94K/5mVF5o0QAgLTpSpJpiMWyjwSWurD9/p663S2P2
N5bjW+gcNhV4F4mMMNE4432WX4+rs8XB9b45t5YyvpyOL0u4mhn82TYY4WazPQEy
mmRAn81rUuRUdBATdwuIEGNpastYvAxCzNbZR2uyv/uH1Llbb7DHdW78Vh0M7hq3
ypdm0jW5HQL3LLtX1Y3PFbMilfluCoWbreVz+I+/9WAYB5z4KspT3AJNDUWjhtZl
PeFxSbsHbSSD+ILSnGYB02lMum0YnVe5YFIHCTJXZIj53DtkzTF9xb70Q7tWyMY=
=3SxE
-----END PGP SIGNATURE-----

View File

@ -1,3 +1,14 @@
-------------------------------------------------------------------
Tue Sep 22 13:15:51 UTC 2015 - meissner@suse.com
- Update to version 9.10.2-P4
* An incorrect boundary boundary check in the OPENPGPKEY
rdatatype could trigger an assertion failure.
(CVE-2015-5986) [RT #40286] (bsc#944107)
* A buffer accounting error could trigger an
assertion failure when parsing certain malformed
DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)
-------------------------------------------------------------------
Wed Jul 29 19:24:40 UTC 2015 - lmuelle@suse.com

View File

@ -18,8 +18,8 @@
Name: bind
%define pkg_name bind
%define pkg_vers 9.10.2-P3
%define rpm_vers 9.10.2P3
%define pkg_vers 9.10.2-P4
%define rpm_vers 9.10.2P4
%define idn_vers 1.0
Summary: Domain Name System (DNS) Server (named)
License: ISC
@ -34,7 +34,8 @@ Source4: %name.keyring
Source1: vendor-files.tar.bz2
Source2: baselibs.conf
Source9: ftp://ftp.internic.net/domain/named.root
Source40: http://www.venaas.no/ldap/bind-sdb/dnszone-schema.txt
# url http://www.venaas.no/ldap/bind-sdb/dnszone-schema.txt no longer exists...
Source40: dnszone-schema.txt
Patch: configure.in.diff
Patch1: Makefile.in.diff
Patch4: perl-path.diff

View File

@ -9,8 +9,8 @@
; on server FTP.INTERNIC.NET
; -OR- RS.INTERNIC.NET
;
; last update: November 05, 2014
; related version of root zone: 2014110501
; last update: May 23, 2015
; related version of root zone: 2015052300
;
; formerly NS.INTERNIC.NET
;