Commit Graph

  • 28ed4dee3a Accepting request 611520 from network Dominique Leuenberger 2018-05-23 14:08:09 +00:00
  • 34d201c2e7 Accepting request 611353 from home:scabrero:branches:network Navin Kukreja 2018-05-23 09:09:10 +00:00
  • ccaf6117d3 Accepting request 610097 from home:nkukreja:branches:network Navin Kukreja 2018-05-17 14:45:41 +00:00
  • 69299c3f09 Accepting request 609105 from home:nkukreja:branches:network Navin Kukreja 2018-05-16 10:46:10 +00:00
  • d7e40ae27a Accepting request 598053 from network Dominique Leuenberger 2018-04-19 13:32:39 +00:00
  • 63b17d629c Accepting request 597553 from home:rudi_m:branches:network Ismail Dönmez 2018-04-19 08:15:25 +00:00
  • 39bb2ac8e6 Accepting request 580553 from network Dominique Leuenberger 2018-03-01 11:01:19 +00:00
  • 862ae2408a Accepting request 580513 from home:rudi_m:branches:network Dirk Mueller 2018-02-27 10:12:33 +00:00
  • 52402d04b2 Accepting request 577263 from network Dominique Leuenberger 2018-02-18 10:39:23 +00:00
  • 709c0c9ee2 Accepting request 577255 from home:bmwiedemann:branches:network Dirk Mueller 2018-02-16 14:01:14 +00:00
  • a337feedfe Accepting request 574246 from network Dominique Leuenberger 2018-02-10 16:52:20 +00:00
  • c27658fca1 Accepting request 574119 from home:nkukreja:branches:network Navin Kukreja 2018-02-08 13:15:18 +00:00
  • f9e528bffa Accepting request 568772 from network Dominique Leuenberger 2018-01-26 12:37:51 +00:00
  • 41f90b8125 Accepting request 568769 from home:nkukreja:branches:network Navin Kukreja 2018-01-23 22:28:59 +00:00
  • 4b487a5807 Accepting request 554965 from network Dominique Leuenberger 2018-01-13 20:36:06 +00:00
  • 3dc2357a41 Accepting request 554799 from home:vitezslav_cizek:branches:network Ismail Dönmez 2017-12-07 10:37:08 +00:00
  • e04eec6142 - license changed to MPL-2.0 according to legal. Marcus Meissner 2017-11-25 15:31:35 +00:00
  • b264302d00 Accepting request 545259 from home:scarabeus_iv:branches:network Marcus Meissner 2017-11-24 16:29:49 +00:00
  • 6c11f8d877 Accepting request 544658 from home:RBrownSUSE:branches:network Dirk Mueller 2017-11-24 10:22:50 +00:00
  • 4728a9bd1f Accepting request 544110 from network Dominique Leuenberger 2017-11-23 08:34:41 +00:00
  • fc48f6ba17 Accepting request 543879 from home:pluskalm:branches:network Dirk Mueller 2017-11-21 09:43:45 +00:00
  • e672e05633 Accepting request 525963 from network Dominique Leuenberger 2017-09-15 19:09:07 +00:00
  • efc0e572f3 Accepting request 523293 from home:msmeissn:branches:network OBS User mrdocs 2017-09-14 01:12:46 +00:00
  • 8decc9c4e9 Accepting request 521995 from network Dominique Leuenberger 2017-09-09 18:23:48 +00:00
  • dcab876062 OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=217 Marcus Meissner 2017-09-07 12:06:06 +00:00
  • 7e6301a923 Accepting request 520246 from home:j-engel:branches:network Marcus Meissner 2017-09-07 12:02:08 +00:00
  • 44f399a675 Accepting request 510389 from network Dominique Leuenberger 2017-07-30 09:21:58 +00:00
  • 70734c6ca6 Accepting request 510278 from home:msmeissn:branches:network Dirk Mueller 2017-07-14 17:29:38 +00:00
  • 29771cc25c Accepting request 507946 from network Dominique Leuenberger 2017-07-04 07:08:41 +00:00
  • 4215a9d83e Accepting request 507735 from home:dimstar:Factory OBS User mrdocs 2017-07-03 22:11:50 +00:00
  • 43448a770a Accepting request 507232 from home:simotek:branches:network Dirk Mueller 2017-06-30 10:58:48 +00:00
  • 076c5e6f0a Accepting request 496968 from network Dominique Leuenberger 2017-05-20 15:55:49 +00:00
  • 7b1425a23f Accepting request 496935 from home:dimstar:Factory Marcus Meissner 2017-05-20 15:34:20 +00:00
  • a34dbd464f Accepting request 482314 from network Yuchen Lin 2017-03-31 13:04:55 +00:00
  • 4e8c935dd7 Accepting request 481339 from home:kukuk:branches:network Marcus Meissner 2017-03-23 16:11:03 +00:00
  • f36624c448 Accepting request 459475 from network Dominique Leuenberger 2017-02-24 23:48:56 +00:00
  • 44c7103fc2 Accepting request 458921 from home:kukuk:branches:network Marcus Meissner 2017-02-21 10:39:18 +00:00
  • fbedf62a14 Accepting request 457428 from network Dominique Leuenberger 2017-02-18 02:15:00 +00:00
  • 9e49836a48 Accepting request 457420 from home:nkukreja:branches:network Navin Kukreja 2017-02-15 13:26:45 +00:00
  • def83543b1 Accepting request 452040 from network Dominique Leuenberger 2017-01-25 21:38:48 +00:00
  • f26d340f7b Accepting request 452036 from home:AndreasStieger:branches:network Dirk Mueller 2017-01-23 20:09:49 +00:00
  • c6ec97ecb6 Accepting request 449784 from home:simotek:branches:network Dirk Mueller 2017-01-12 12:21:22 +00:00
  • 439ef42e37 Accepting request 438333 from network Dominique Leuenberger 2016-11-03 10:11:17 +00:00
  • 318666062f Accepting request 438189 from home:psimons:branches:network Marcus Meissner 2016-11-02 13:30:34 +00:00
  • ea77a151fd Accepting request 430623 from network Dominique Leuenberger 2016-09-28 00:38:15 +00:00
  • 7af14e49dd Accepting request 430610 from home:psimons:branches:network Ismail Dönmez 2016-09-27 18:38:49 +00:00
  • b7bfd06664 Accepting request 404235 from network Dominique Leuenberger 2016-07-01 07:55:03 +00:00
  • 8b99b04f2a - Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483, bsc#963971). - Make /var/lib/named owned by the named user (bsc#908850, bsc#875691). - Call systemd service macros with the full service name. - Security update 9.10.3-P4: Reinhard Max 2016-06-16 12:00:45 +00:00
  • d15631016c Accepting request 390129 from network Dominique Leuenberger 2016-04-30 21:24:51 +00:00
  • 2e4b7daa78 Accepting request 389954 from home:lnussel:branches:network Rusmir Duško 2016-04-15 07:56:29 +00:00
  • 7ad85aecdc Accepting request 370068 from network Dominique Leuenberger 2016-03-18 20:33:29 +00:00
  • 2d8afe69b8 - Security update 9.10.3-P3: * CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure. Reinhard Max 2016-03-11 13:59:03 +00:00
  • abbe73be65 - Security update 9.10.3-P3 fixes two assertion failures that can lead to remote DoS: * CVE-2016-1285, bsc#970072 * CVE-2016-1286, bsc#970073 Reinhard Max 2016-03-11 13:55:29 +00:00
  • c470e3f7b2 Accepting request 361595 from network Dominique Leuenberger 2016-03-01 08:38:53 +00:00
  • 0f06af6f9d Accepting request 361463 from home:bmwiedemann:branches:network Dirk Mueller 2016-02-26 07:55:47 +00:00
  • fd2b586269 Sligthly enhance the last commmit Lars Müller 2016-02-12 21:48:50 +00:00
  • 9508d45935 Accepting request 359100 from home:elvigia:branches:network Lars Müller 2016-02-12 19:11:31 +00:00
  • dfc6526d85 Accepting request 354931 from network Dominique Leuenberger 2016-01-28 16:19:51 +00:00
  • c7dc2ebf4f - Security update 9.10.3-P3: * Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189). * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure (CVE-2015-8705, bsc#962190). * Authoritative servers that were marked as bogus (e.g. blackholed in configuration or with invalid addresses) were being queried anyway. Reinhard Max 2016-01-20 11:04:34 +00:00
  • eaab871f66 Accepting request 350227 from network Dominique Leuenberger 2015-12-23 08:56:59 +00:00
  • 7c65773c2b OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=181 Reinhard Max 2015-12-21 17:51:47 +00:00
  • 5f956be5fc - Update to version 9.10.3-P2 to fix a remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861). Reinhard Max 2015-12-21 17:12:31 +00:00
  • 2fae4c21e5 Accepting request 336452 from network Dominique Leuenberger 2015-10-22 10:56:27 +00:00
  • ee28860376 Accepting request 336332 from home:jengelh:branches:network Reinhard Max 2015-10-05 07:46:26 +00:00
  • a6ded40d51 Accepting request 333033 from network Dominique Leuenberger 2015-10-01 10:21:12 +00:00
  • f17cebd7c5 Accepting request 332971 from home:msmeissn:branches:network Lars Müller 2015-09-22 20:15:47 +00:00
  • 758f271f13 Accepting request 319467 from network Dominique Leuenberger 2015-08-10 07:12:26 +00:00
  • f94eebf621 - Update to version 9.10.2-P3 Security Fixes * A specially crafted query could trigger an assertion failure in message.c. This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795] * On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server. This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795] Bug Fixes * Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] * Several bugs have been fixed in the RPZ implementation: + Policy zones that did not specifically require recursion could be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. This has been corrected. In most configurations, behavioral changes due to this fix will not be noticeable. [RT #39229] + The server could crash if policy zones were updated (e.g. via rndc reload or an incoming zone transfer) while RPZ processing was still ongoing for an active query. [RT #39415] + On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] + The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] + The server could crash if a reload of an RPZ zone was initiated while Lars Müller 2015-07-29 19:36:46 +00:00
  • 523ac751e6 Accepting request 317302 from network Stephan Kulow 2015-07-21 11:26:38 +00:00
  • 5693887a0c - Update to version 9.10.2-P2 - An uninitialized value in validator.c could result in an assertion failure. (CVE-2015-4620) [RT #39795] - Update to version 9.10.2-P1 - Include client-ip rules when logging the number of RPZ rules of each type. [RT #39670] - Addressed further problems with reloading RPZ zones. [RT #39649] - Addressed a regression introduced in change #4121. [RT #39611] - The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] - On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] - A bug in RPZ could cause the server to crash if policy zones were updated while recursion was pending for RPZ processing of an active query. [RT #39415] - Fix a bug in RPZ that could cause some policy zones that did not specifically require recursion to be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. [RT #39229] - Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] - Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn't result in a bug during operation. If the read failed, named could segfault. [RT #38559] Lars Müller 2015-07-10 20:54:40 +00:00
  • c76dd164ae Accepting request 313681 from network Stephan Kulow 2015-07-05 15:58:14 +00:00
  • 2d26a35729 Change log line wrapping. Lars Müller 2015-06-18 13:14:58 +00:00
  • 755db9e738 Accepting request 311393 from home:guohouzuo:freeipa Marcus Meissner 2015-06-18 12:30:16 +00:00
  • 78c996f2f3 Accepting request 305964 from network Stephan Kulow 2015-05-10 08:56:58 +00:00
  • 1ea9273bb0 This change set makes bind build again for SLE 11 too. Lars Müller 2015-05-08 18:11:21 +00:00
  • 44ffc351bb - Update to version 9.10.2 - Handle timeout in legacy system test. [RT #38573] - dns_rdata_freestruct could be called on a uninitialised structure when handling a error. [RT #38568] - Addressed valgrind warnings. [RT #38549] - UDP dispatches could use the wrong pseudorandom number generator context. [RT #38578] - Fixed several small bugs in automatic trust anchor management, including a memory leak and a possible loss of key state information. [RT #38458] - 'dnssec-dsfromkey -T 0' failed to add ttl field. [RT #38565] - Revoking a managed trust anchor and supplying an untrusted replacement could cause named to crash with an assertion failure. (CVE-2015-1349) [RT #38344] - Fix a leak of query fetchlock. [RT #38454] - Fix a leak of pthread_mutexattr_t. [RT #38454] - RPZ could send spurious SERVFAILs in response to duplicate queries. [RT #38510] - CDS and CDNSKEY had the wrong attributes. [RT #38491] - adb hash table was not being grown. [RT #38470] - Update bind.keyring - Update baselibs.conf due to updates to libdns160 and libisc148 Lars Müller 2015-05-08 15:44:01 +00:00
  • fa2687cc7a Accepting request 305950 from home:guohouzuo:freeipa Lars Müller 2015-05-08 14:24:45 +00:00
  • f744db865a Accepting request 285623 from network Dominique Leuenberger 2015-02-13 07:34:47 +00:00
  • a72d9724b3 Accepting request 285468 from home:k0da:branches:network Marcus Meissner 2015-02-11 12:29:20 +00:00
  • 6b0a83c841 Accepting request 282345 from network Dominique Leuenberger 2015-01-22 20:48:52 +00:00
  • 4d1f101c72 added mistakenly deleted row (Request 266520) Andrey Karepin 2015-01-11 18:19:25 +00:00
  • 43ba3368ef Accepting request 266520 from home:jengelh:branches:network Andrey Karepin 2015-01-11 16:14:25 +00:00
  • c183b54c3e Accepting request 264811 from network Dominique Leuenberger 2014-12-19 08:41:28 +00:00
  • ce7779f753 Add lost hyphen to minimize diff with the submit request to factory. Lars Müller 2014-12-11 15:29:03 +00:00
  • 70eef698ee Accepting request 264794 from home:jengelh:branches:network Lars Müller 2014-12-11 14:46:49 +00:00
  • 24da4f54fa Accepting request 264596 from home:lmuelle:bind Lars Müller 2014-12-09 22:47:11 +00:00
  • c38019450e Accepting request 264325 from home:lmuelle:bind Marcus Meissner 2014-12-08 08:18:17 +00:00
  • c1eb80a9c7 - Removed pid-path.diff Marcus Meissner 2014-12-05 10:58:49 +00:00
  • 932f848950 Accepting request 264083 from home:lmuelle:bind Marcus Meissner 2014-12-05 10:12:05 +00:00
  • e179acbc40 Accepting request 261547 from home:dimstar:gpg2 Lars Müller 2014-11-14 10:36:34 +00:00
  • dab82c1e27 Accepting request 253555 from home:jengelh:branches:network Reinhard Max 2014-10-16 14:25:14 +00:00
  • dbf68b7a71 Accepting request 248826 from network Stephan Kulow 2014-09-15 15:40:38 +00:00
  • 48ca52dcbe Accepting request 248172 from home:WernerFink:branches:network Andrey Karepin 2014-09-12 05:49:00 +00:00
  • c0a72d4f0b Accepting request 248035 from home:WernerFink:branches:network Reinhard Max 2014-09-08 14:06:56 +00:00
  • 27153bee19 - Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511). Reinhard Max 2014-09-03 11:44:55 +00:00
  • 40916246e7 - Version 9.9.5P1 also fixes orphan mode (bnc#883859). Reinhard Max 2014-09-03 11:40:39 +00:00
  • 92df98215b Accepting request 243383 from network Stephan Kulow 2014-08-05 08:24:16 +00:00
  • ed559646e6 Accepting request 243329 from home:lmuelle:branches:network Marcus Meissner 2014-08-01 11:43:42 +00:00
  • 367e8d58c7 Accepting request 236023 from network Stephan Kulow 2014-06-05 08:49:37 +00:00
  • 03789a4890 Accepting request 235970 from home:computersalat:devel:network Sascha Peilicke 2014-06-02 09:09:36 +00:00