Commit Graph

  • 48ca52dcbe Accepting request 248172 from home:WernerFink:branches:network Andrey Karepin 2014-09-12 05:49:00 +00:00
  • 8ad1025bc7 Accepting request 248035 from home:WernerFink:branches:network Reinhard Max 2014-09-08 14:06:56 +00:00
  • c0a72d4f0b Accepting request 248035 from home:WernerFink:branches:network Reinhard Max 2014-09-08 14:06:56 +00:00
  • a4fc6e04f6 - Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511). Reinhard Max 2014-09-03 11:44:55 +00:00
  • 27153bee19 - Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511). Reinhard Max 2014-09-03 11:44:55 +00:00
  • 0c11b5bc0e - Version 9.9.5P1 also fixes orphan mode (bnc#883859). Reinhard Max 2014-09-03 11:40:39 +00:00
  • 40916246e7 - Version 9.9.5P1 also fixes orphan mode (bnc#883859). Reinhard Max 2014-09-03 11:40:39 +00:00
  • 04e849b536 Accepting request 243383 from network Stephan Kulow 2014-08-05 08:24:16 +00:00
  • 92df98215b Accepting request 243383 from network Stephan Kulow 2014-08-05 08:24:16 +00:00
  • 2ec70f5d8c Accepting request 243329 from home:lmuelle:branches:network Marcus Meissner 2014-08-01 11:43:42 +00:00
  • ed559646e6 Accepting request 243329 from home:lmuelle:branches:network Marcus Meissner 2014-08-01 11:43:42 +00:00
  • 1ab3b7fb3e Accepting request 236023 from network Stephan Kulow 2014-06-05 08:49:37 +00:00
  • 367e8d58c7 Accepting request 236023 from network Stephan Kulow 2014-06-05 08:49:37 +00:00
  • 4a74eeb844 Accepting request 235970 from home:computersalat:devel:network Sascha Peilicke 2014-06-02 09:09:36 +00:00
  • 03789a4890 Accepting request 235970 from home:computersalat:devel:network Sascha Peilicke 2014-06-02 09:09:36 +00:00
  • 54fbdda7ba Accepting request 235320 from home:elvigia:branches:network Marcus Meissner 2014-06-01 10:06:10 +00:00
  • b25ceb6024 Accepting request 235320 from home:elvigia:branches:network Marcus Meissner 2014-06-01 10:06:10 +00:00
  • 7f4812fd9f Accepting request 233016 from network Stephan Kulow 2014-05-22 18:37:37 +00:00
  • a718b04e9b Accepting request 233016 from network Stephan Kulow 2014-05-22 18:37:37 +00:00
  • e79637886e Re-sync changes file with SLE12. Reinhard Max 2014-05-08 10:01:10 +00:00
  • 8dac1c49a4 Re-sync changes file with SLE12. Reinhard Max 2014-05-08 10:01:10 +00:00
  • 8a8f91c133 Accepting request 233009 from home:oertel:branches:network Reinhard Max 2014-05-08 09:51:15 +00:00
  • 9927c8db29 Accepting request 233009 from home:oertel:branches:network Reinhard Max 2014-05-08 09:51:15 +00:00
  • 24f1d8fef1 Accepting request 215020 from network Stephan Kulow 2014-01-30 18:14:08 +00:00
  • ff2ca456eb Accepting request 215020 from network Stephan Kulow 2014-01-30 18:14:08 +00:00
  • f400ca12b9 - Add the sdb-ldap backend module (fate#313216). - Details can be found here: * http://bind9-ldap.bayour.com/ * http://bind9-ldap.bayour.com/dnszonehowto.html Reinhard Max 2014-01-24 10:15:48 +00:00
  • f40daf517b - Add the sdb-ldap backend module (fate#313216). - Details can be found here: * http://bind9-ldap.bayour.com/ * http://bind9-ldap.bayour.com/dnszonehowto.html Reinhard Max 2014-01-24 10:15:48 +00:00
  • e9480232c5 unfuzz rpz2-9.9.4.patch Reinhard Max 2014-01-21 17:29:39 +00:00
  • 6fa65ad99d unfuzz rpz2-9.9.4.patch Reinhard Max 2014-01-21 17:29:39 +00:00
  • 5361df72e9 - Update to version 9.9.4P2 * Fixes named crash when handling malformed NSEC3-signed zones (CVE-2014-0591, bnc#858639) * Obsoletes workaround-compile-problem.diff - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now supported upstream (--enable-rrl). Reinhard Max 2014-01-21 17:09:17 +00:00
  • 2280b862ef - Update to version 9.9.4P2 * Fixes named crash when handling malformed NSEC3-signed zones (CVE-2014-0591, bnc#858639) * Obsoletes workaround-compile-problem.diff - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now supported upstream (--enable-rrl). Reinhard Max 2014-01-21 17:09:17 +00:00
  • dd52b4453b Accepting request 210487 from network Stephan Kulow 2013-12-13 12:01:42 +00:00
  • d26e1590d4 Accepting request 210487 from network Stephan Kulow 2013-12-13 12:01:42 +00:00
  • 707035c86d Remove createNamedConfInclude~ Reinhard Max 2013-12-09 13:33:42 +00:00
  • f61744ed46 Remove createNamedConfInclude~ Reinhard Max 2013-12-09 13:33:42 +00:00
  • e708a92edf Fix creation of /etc/named.conf.include . Reinhard Max 2013-12-09 12:23:41 +00:00
  • c13e4cf96e Fix creation of /etc/named.conf.include . Reinhard Max 2013-12-09 12:23:41 +00:00
  • f3df1b2fcf Accepting request 186266 from network Tomáš Chvátal 2013-08-10 16:28:25 +00:00
  • 82e8a1d0eb Accepting request 186266 from network Tomáš Chvátal 2013-08-10 16:28:25 +00:00
  • f9b2203211 - Systemd doesn't set $TERM, and hence breaks tput (bnc#823175). Reinhard Max 2013-08-07 15:23:09 +00:00
  • e0efd1bf47 - Systemd doesn't set $TERM, and hence breaks tput (bnc#823175). Reinhard Max 2013-08-07 15:23:09 +00:00
  • 27de4a59cf - Systemd doesn't set $TERM, and hence breaks tput. Reinhard Max 2013-08-07 15:21:50 +00:00
  • b255a507e5 - Systemd doesn't set $TERM, and hence breaks tput. Reinhard Max 2013-08-07 15:21:50 +00:00
  • 5a561fec1f - Improve pie_compile.diff (bnc#828874). - dnssec-checkds and dnssec-coverage need python-base. - disable rpath in libtool. Reinhard Max 2013-08-06 13:06:41 +00:00
  • ef9b332868 - Improve pie_compile.diff (bnc#828874). - dnssec-checkds and dnssec-coverage need python-base. - disable rpath in libtool. Reinhard Max 2013-08-06 13:06:41 +00:00
  • 4d6c8a75f7 dnssec-checkds and dnssec-coverage need python-base for building. Reinhard Max 2013-08-06 09:11:23 +00:00
  • 2e7cad6b7d dnssec-checkds and dnssec-coverage need python-base for building. Reinhard Max 2013-08-06 09:11:23 +00:00
  • 2650fe1a57 - Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899. * Incorrect bounds checking on private type 'keydata' can lead to a remotely triggerable REQUIRE failure. Reinhard Max 2013-08-05 14:51:21 +00:00
  • 28ef07b698 - Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899. * Incorrect bounds checking on private type 'keydata' can lead to a remotely triggerable REQUIRE failure. Reinhard Max 2013-08-05 14:51:21 +00:00
  • 7a11ec83bf Accepting request 184213 from network Stephan Kulow 2013-07-24 21:30:38 +00:00
  • b557cafc2b Accepting request 184213 from network Stephan Kulow 2013-07-24 21:30:38 +00:00
  • dd09f324e6 - Remove non-working apparmor profiles (bnc#740327). Reinhard Max 2013-07-24 15:38:10 +00:00
  • 8e89b870e6 - Remove non-working apparmor profiles (bnc#740327). Reinhard Max 2013-07-24 15:38:10 +00:00
  • b96726cf8b Accepting request 183526 from network Stephan Kulow 2013-07-18 13:47:35 +00:00
  • bbd51e19ce Accepting request 183526 from network Stephan Kulow 2013-07-18 13:47:35 +00:00
  • fe9ffc2cb4 - the README file is not a directory, drop the dir attribute Michael Schröder 2013-07-17 12:09:28 +00:00
  • 918e706647 - the README file is not a directory, drop the dir attribute Michael Schröder 2013-07-17 12:09:28 +00:00
  • 391059757e Accepting request 181326 from network Stephan Kulow 2013-07-02 04:44:24 +00:00
  • 0d294dc7c6 Accepting request 181326 from network Stephan Kulow 2013-07-02 04:44:24 +00:00
  • 1ca9099ec4 - moved dnssec-* helpers to bind-utils package. bnc#813911 Marcus Meissner 2013-06-27 09:27:34 +00:00
  • 67378e3874 - moved dnssec-* helpers to bind-utils package. bnc#813911 Marcus Meissner 2013-06-27 09:27:34 +00:00
  • 4d23be9b10 - Updated to current rate limiting + rpz patch from http://ss.vix.su/~vjs/rrlrpz.html Marcus Meissner 2013-06-26 12:27:48 +00:00
  • 7f803cee73 - Updated to current rate limiting + rpz patch from http://ss.vix.su/~vjs/rrlrpz.html Marcus Meissner 2013-06-26 12:27:48 +00:00
  • e8a3388b1d Security and maintenance issues: Marcus Meissner 2013-06-26 10:51:54 +00:00
  • 306b1609e0 Security and maintenance issues: Marcus Meissner 2013-06-26 10:51:54 +00:00
  • 8242d72ff0 - Use updated config.guess/sub in the embedded idnkit sources Marcus Meissner 2013-06-26 10:50:57 +00:00
  • 7dbe78dc6a - Use updated config.guess/sub in the embedded idnkit sources Marcus Meissner 2013-06-26 10:50:57 +00:00
  • e979739721 - Updated to 9.9.3-P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [security] Caching data from an incompletely signed zone could trigger an assertion failure in resolver.c [RT #33690] - [security] Support NAPTR regular expression validation on all platforms without using libregex, which can be vulnerable to memory exhaustion attack (CVE-2013-2266). [RT #32688] - [security] RPZ rules to generate A records (but not AAAA records) could trigger an assertion failure when used in conjunction with DNS64 (CVE-2012-5689). [RT #32141] - [bug] Fixed several Coverity warnings. Note: This change includes a fix for a bug that was subsequently determined to be an exploitable security vulnerability, CVE-2012-5688: named could die on specific queries with dns64 enabled. [RT #30996] - [maint] Added AAAA for D.ROOT-SERVERS.NET. - [maint] D.ROOT-SERVERS.NET is now 199.7.91.13. Marcus Meissner 2013-06-26 10:50:27 +00:00
  • 8591e27de2 - Updated to 9.9.3-P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [security] Caching data from an incompletely signed zone could trigger an assertion failure in resolver.c [RT #33690] - [security] Support NAPTR regular expression validation on all platforms without using libregex, which can be vulnerable to memory exhaustion attack (CVE-2013-2266). [RT #32688] - [security] RPZ rules to generate A records (but not AAAA records) could trigger an assertion failure when used in conjunction with DNS64 (CVE-2012-5689). [RT #32141] - [bug] Fixed several Coverity warnings. Note: This change includes a fix for a bug that was subsequently determined to be an exploitable security vulnerability, CVE-2012-5688: named could die on specific queries with dns64 enabled. [RT #30996] - [maint] Added AAAA for D.ROOT-SERVERS.NET. - [maint] D.ROOT-SERVERS.NET is now 199.7.91.13. Marcus Meissner 2013-06-26 10:50:27 +00:00
  • f9b31465e5 Accepting request 174827 from network Stephan Kulow 2013-05-13 12:43:11 +00:00
  • adb3422044 Accepting request 174827 from network Stephan Kulow 2013-05-13 12:43:11 +00:00
  • 4c04b1d2cb Accepting request 174818 from devel:ARM:AArch64:Factory Marcus Meissner 2013-05-08 13:45:12 +00:00
  • e2db8fe61f Accepting request 174818 from devel:ARM:AArch64:Factory Marcus Meissner 2013-05-08 13:45:12 +00:00
  • 4e0ded3ba6 Accepting request 161413 from network Stephan Kulow 2013-03-28 12:09:59 +00:00
  • 65bfa5b3d2 Accepting request 161413 from network Stephan Kulow 2013-03-28 12:09:59 +00:00
  • b6e3e68eb3 - Updated to 9.9.2-P2 (bnc#811876) Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266 * Security Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [RT #32688] - added gpg key source verification Marcus Meissner 2013-03-27 12:36:47 +00:00
  • eec4a4f40d - Updated to 9.9.2-P2 (bnc#811876) Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266 * Security Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [RT #32688] - added gpg key source verification Marcus Meissner 2013-03-27 12:36:47 +00:00
  • e7bf613ec5 Accepting request 144433 from network Ismail Dönmez 2012-12-07 13:06:47 +00:00
  • 00ba642f3d Accepting request 144433 from network Ismail Dönmez 2012-12-07 13:06:47 +00:00
  • f3b79489bd OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=109 Marcus Meissner 2012-12-06 15:46:53 +00:00
  • 4d43181a2f OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=109 Marcus Meissner 2012-12-06 15:46:53 +00:00
  • 485f73bbcd OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=108 Marcus Meissner 2012-12-06 15:46:13 +00:00
  • d414c6c46e OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=108 Marcus Meissner 2012-12-06 15:46:13 +00:00
  • f1b6a5383e - Updated to 9.9.2-P1 (bnc#792926) https://kb.isc.org/article/AA-00828 * Security Fixes Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; Marcus Meissner 2012-12-06 08:05:49 +00:00
  • 636c118d37 - Updated to 9.9.2-P1 (bnc#792926) https://kb.isc.org/article/AA-00828 * Security Fixes Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; Marcus Meissner 2012-12-06 08:05:49 +00:00
  • 27152b533e Accepting request 141805 from network Stephan Kulow 2012-11-20 09:15:16 +00:00
  • 2f2a5e17d4 Accepting request 141805 from network Stephan Kulow 2012-11-20 09:15:16 +00:00
  • 460b3333d4 - added a ratelimiting (draft RFC) patch from Paul Vixie. see http://www.redbarn.org/dns/ratelimits suggested by Stefan Schaefer <stefan@invis-server.org> Marcus Meissner 2012-11-18 18:12:17 +00:00
  • 4161728e00 - added a ratelimiting (draft RFC) patch from Paul Vixie. see http://www.redbarn.org/dns/ratelimits suggested by Stefan Schaefer <stefan@invis-server.org> Marcus Meissner 2012-11-18 18:12:17 +00:00
  • 9341fb3fa6 Accepting request 141386 from network Stephan Kulow 2012-11-17 06:19:12 +00:00
  • 13cb2fb5aa Accepting request 141386 from network Stephan Kulow 2012-11-17 06:19:12 +00:00
  • f2ffc7542f - unfuzzed patches: perl-path.diff pie_compile.diff workaround-compile-problem.diff Marcus Meissner 2012-11-15 09:54:51 +00:00
  • 720e0417f1 - unfuzzed patches: perl-path.diff pie_compile.diff workaround-compile-problem.diff Marcus Meissner 2012-11-15 09:54:51 +00:00
  • 63e830c376 Accepting request 141301 from home:msmeissn:branches:network Marcus Meissner 2012-11-14 14:01:06 +00:00
  • d0bcf798bc Accepting request 141301 from home:msmeissn:branches:network Marcus Meissner 2012-11-14 14:01:06 +00:00
  • ad675fa9bc freshed patches Marcus Meissner 2012-11-14 10:31:31 +00:00
  • 96ef1056ef freshed patches Marcus Meissner 2012-11-14 10:31:31 +00:00
  • 287cb23801 - updated to 9.9.2 https://kb.isc.org/article/AA-00798 Security: * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] * Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * Adds configuration option "max-rsa-exponent-size <value>;" that can Marcus Meissner 2012-11-14 10:25:52 +00:00
  • d3e988aaee - updated to 9.9.2 https://kb.isc.org/article/AA-00798 Security: * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] * Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * Adds configuration option "max-rsa-exponent-size <value>;" that can Marcus Meissner 2012-11-14 10:25:52 +00:00
  • 63db85c703 Accepting request 138821 from network Ismail Dönmez 2012-10-25 08:59:07 +00:00