From b842fbd70f710e7e1f366651724ab767d89220f86346689f769d6bd9f7502561 Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Sat, 18 Jun 2022 13:08:27 +0000 Subject: [PATCH] Accepting request 982818 from home:jmoellers:branches:network OBS-URL: https://build.opensuse.org/request/show/982818 OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=347 --- bind-9.18.3.tar.xz | 3 --- bind-9.18.3.tar.xz.sha512.asc | 17 ------------- bind-9.18.4.tar.xz | 3 +++ bind-9.18.4.tar.xz.sha512.asc | 16 +++++++++++++ bind-prevent-buffer-overflow.patch | 38 ------------------------------ bind.changes | 23 ++++++++++++++++++ bind.spec | 3 +-- 7 files changed, 43 insertions(+), 60 deletions(-) delete mode 100644 bind-9.18.3.tar.xz delete mode 100644 bind-9.18.3.tar.xz.sha512.asc create mode 100644 bind-9.18.4.tar.xz create mode 100644 bind-9.18.4.tar.xz.sha512.asc delete mode 100644 bind-prevent-buffer-overflow.patch diff --git a/bind-9.18.3.tar.xz b/bind-9.18.3.tar.xz deleted file mode 100644 index 1387911..0000000 --- a/bind-9.18.3.tar.xz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:0ad8da773bd93cba0ef66cc81999698ebdf9c3e51faed5e5c8c1eb75cad2ae6f -size 5136984 diff --git a/bind-9.18.3.tar.xz.sha512.asc b/bind-9.18.3.tar.xz.sha512.asc deleted file mode 100644 index 257d024..0000000 --- a/bind-9.18.3.tar.xz.sha512.asc +++ /dev/null @@ -1,17 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Comment: GPGTools - https://gpgtools.org - -iQIzBAABCgAdFiEEqtu6UHTxQC97adVrxbTukxqfnf0FAmJ7ilwACgkQxbTukxqf -nf3Oyw/8D9mK2rDC/kIPVZnTL5G9s+Qhy/fEeVwKrjbszK1spQUsfSwIzfMcRN6x -eJ7d1RcCN+zVv0JGaa5sa2pa6ftpP2PiZ3OrxdenN9/GdeXl7Tepm9/c7Pg0SEfk -hupo0JG+O1vHThWn82x0F1EnJ+qUdHlVYROeu887Da9SFOPKCo5jOey5u3LM55OA -0WbZRIjeWUExGWK54wREEOJ0fpNzGQNo+amf82FimgV7jWtTmPyreqlrO+UnJgKs -tu1Gf3/a8kQy6AIHnHnBHIZdelPzZ+4omFfdP5f9/0LIB2rrWxzgtYBHMLZJcc7z -vL60iIjK8JxtmcKdu8bugPnL1L2wVjb1uf5t23PO/yewngJbrI54+eQHdqrTRqsY -LdzQcJ8pWA6GuFtlTDrcSwuvxGa8+0U3HkQdUo4F0L7TW60zkfRd9enTli2Kxoa/ -KRHuVAa9Veg9ybdyWF4gITqH21H8MT/0l1Pn2f9JVosTI/s2N5kJ29e4C47THav5 -iqY0NKtZGjMrExbkel0fQ2d/GecrT0QeZBEl3MTkj7kzWq1aHr987Q+N+vqkw5kj -V88kdYgWgR6JnrvkUHSI/LYagMnXt7kktAQ+OudY0fNaUjRqnR0UqZez87fEc3xr -/VDn/PEppUooa2lHKjnMv415SStLQkb1I0GqLAOBKjqvwt9B8dw= -=JC/r ------END PGP SIGNATURE----- diff --git a/bind-9.18.4.tar.xz b/bind-9.18.4.tar.xz new file mode 100644 index 0000000..205256b --- /dev/null +++ b/bind-9.18.4.tar.xz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f277ae50159a00c300eb926a9c5d51953038a936bd8242d6913dfb6eac42761d +size 5395040 diff --git a/bind-9.18.4.tar.xz.sha512.asc b/bind-9.18.4.tar.xz.sha512.asc new file mode 100644 index 0000000..8cd738f --- /dev/null +++ b/bind-9.18.4.tar.xz.sha512.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCgAdFiEE4l6wzxzoBJ1H8dmmM+EOShg6jkYFAmKgkj4ACgkQM+EOShg6 +jkYdrhAAoamVHXA7Jw0VTKMpvoS2UqplPmxdw6Z/Vy+Sk1/ijXaCpQJ4CaCfDXE1 +N35VAL2YiDOZeyA8zZUrmDXhBneoSZgPQvsa8ADIbpvmyeuhgzy8lLp450q8bM3Z +g9SO+cEnX2RYrMnaMDzJR6ERXT4OtUi747ZFKxO/GIvYA9AOWkeTUZZJ4vO2gke9 +E1TInV8JvxXNu3W31WbkEYg0A9dR7GbqRePTzax9UUzENekVTOZ3P++K0qKILO1D +/pe6MjnpQdPbv4J2L6LPD/RTdjB8G6iCDixAka0lD9EimmOb/HnnKMeBJTNeJGFN +xdCoTxhUgUwkC7OWTQSoBjbmGFFoIfoeM68/bSHG5EwY4DLBe+z1XR7ExFu/Fp0K +3y3qzfTWmPh+zMkoYgqipM6uwyeHBftPJjeexIO0le3I3AvdcqnS0tq79jqpoQ+R +3+tmCViJgsEQNZPekNpHB4I6Y3qOpuY81beA0CjcGIIDBDVGz+pb/0Iyl6MXmQ3f +4TESVmg+LIRPsPRZfrWkHXWm/MnxJWL2raHLX0ts8tricHX1+71YfsJrgaAPgIGp +Scdbee/H5FPCiZ2htxN4vhubHrKk/I6nV2xTBvm6+3vd/Jgjz+r/f1J96sHbOqeZ +ROJLefhShuSGNnE8xTPchC34bbst7IqiJ26d/d8WxTivNPcpr0o= +=HGhB +-----END PGP SIGNATURE----- diff --git a/bind-prevent-buffer-overflow.patch b/bind-prevent-buffer-overflow.patch deleted file mode 100644 index d39789b..0000000 --- a/bind-prevent-buffer-overflow.patch +++ /dev/null @@ -1,38 +0,0 @@ -From 921043b54161c7a3e6dc4036b038ca4dbc5fe472 Mon Sep 17 00:00:00 2001 -From: Evan Hunt -Date: Fri, 13 May 2022 19:59:58 -0700 -Subject: [PATCH] prevent a possible buffer overflow in configuration check - -corrected code that could have allowed a buffer overfow while -parsing named.conf. ---- - lib/bind9/check.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/lib/bind9/check.c b/lib/bind9/check.c -index 658daec76d..baacd29a84 100644 ---- a/lib/bind9/check.c -+++ b/lib/bind9/check.c -@@ -3009,8 +3009,8 @@ check_zoneconf(const cfg_obj_t *zconfig, const cfg_obj_t *voptions, - } else if (dns_name_isula(zname)) { - ula = true; - } -- tmp += strlen(tmp); - len -= strlen(tmp); -+ tmp += strlen(tmp); - (void)snprintf(tmp, len, "%u/%s", zclass, - (ztype == CFG_ZONE_INVIEW) ? target - : (viewname != NULL) ? viewname -@@ -3719,8 +3719,8 @@ check_zoneconf(const cfg_obj_t *zconfig, const cfg_obj_t *voptions, - char *tmp = keydirbuf; - size_t len = sizeof(keydirbuf); - dns_name_format(zname, keydirbuf, sizeof(keydirbuf)); -- tmp += strlen(tmp); - len -= strlen(tmp); -+ tmp += strlen(tmp); - (void)snprintf(tmp, len, "/%s", (dir == NULL) ? "(null)" : dir); - tresult = keydirexist(zconfig, (const char *)keydirbuf, - kaspname, keydirs, logctx, mctx); --- -GitLab - diff --git a/bind.changes b/bind.changes index d19f4ab..2ec861f 100644 --- a/bind.changes +++ b/bind.changes @@ -1,3 +1,26 @@ +------------------------------------------------------------------- +Wed Jun 15 12:37:17 UTC 2022 - Josef Möllers + +- Upgrade to 9.18.4: + Bugs fixed: + * Only write key files if the dnssec-policy keymgr has + changed the metadata. + * When the fetches-per-server quota was adjusted + because of an authoritative server timing out more + or less frequently, it was incorrectly set to 1 + rather than the intended value. + Notable functional changes: + * Key timing options for `dnssec-keygen` and + `dnssec-settime` now accept times as printed by + `dnssec-settime -p`. + * Key timing options for `dnssec-settime` and related + utilities now accept "UNSET" times as printed by + `dnssec-settime -p`. + This obsoletes the following patch: + bind-prevent-buffer-overflow.patch + [bind-9.18.4.tar.xz, bind-9.18.4.tar.xz.sha512.asc, + bind-prevent-buffer-overflow.patch] + ------------------------------------------------------------------- Thu May 19 07:32:31 UTC 2022 - Josef Möllers diff --git a/bind.spec b/bind.spec index 7a5a337..5096b96 100644 --- a/bind.spec +++ b/bind.spec @@ -56,7 +56,7 @@ %define _fillupdir %{_localstatedir}/adm/fillup-templates %endif Name: bind -Version: 9.18.3 +Version: 9.18.4 Release: 0 Summary: Domain Name System (DNS) Server (named) License: MPL-2.0 @@ -75,7 +75,6 @@ Source70: bind.conf # configuation file for systemd-sysusers Source72: named.conf Patch56: bind-ldapdump-use-valid-host.patch -Patch58: bind-prevent-buffer-overflow.patch BuildRequires: libcap-devel BuildRequires: libopenssl-devel BuildRequires: libtool