Accepting request 983574 from network
OBS-URL: https://build.opensuse.org/request/show/983574 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=180
This commit is contained in:
commit
5520abbe8a
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0ad8da773bd93cba0ef66cc81999698ebdf9c3e51faed5e5c8c1eb75cad2ae6f
|
||||
size 5136984
|
@ -1,17 +0,0 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Comment: GPGTools - https://gpgtools.org
|
||||
|
||||
iQIzBAABCgAdFiEEqtu6UHTxQC97adVrxbTukxqfnf0FAmJ7ilwACgkQxbTukxqf
|
||||
nf3Oyw/8D9mK2rDC/kIPVZnTL5G9s+Qhy/fEeVwKrjbszK1spQUsfSwIzfMcRN6x
|
||||
eJ7d1RcCN+zVv0JGaa5sa2pa6ftpP2PiZ3OrxdenN9/GdeXl7Tepm9/c7Pg0SEfk
|
||||
hupo0JG+O1vHThWn82x0F1EnJ+qUdHlVYROeu887Da9SFOPKCo5jOey5u3LM55OA
|
||||
0WbZRIjeWUExGWK54wREEOJ0fpNzGQNo+amf82FimgV7jWtTmPyreqlrO+UnJgKs
|
||||
tu1Gf3/a8kQy6AIHnHnBHIZdelPzZ+4omFfdP5f9/0LIB2rrWxzgtYBHMLZJcc7z
|
||||
vL60iIjK8JxtmcKdu8bugPnL1L2wVjb1uf5t23PO/yewngJbrI54+eQHdqrTRqsY
|
||||
LdzQcJ8pWA6GuFtlTDrcSwuvxGa8+0U3HkQdUo4F0L7TW60zkfRd9enTli2Kxoa/
|
||||
KRHuVAa9Veg9ybdyWF4gITqH21H8MT/0l1Pn2f9JVosTI/s2N5kJ29e4C47THav5
|
||||
iqY0NKtZGjMrExbkel0fQ2d/GecrT0QeZBEl3MTkj7kzWq1aHr987Q+N+vqkw5kj
|
||||
V88kdYgWgR6JnrvkUHSI/LYagMnXt7kktAQ+OudY0fNaUjRqnR0UqZez87fEc3xr
|
||||
/VDn/PEppUooa2lHKjnMv415SStLQkb1I0GqLAOBKjqvwt9B8dw=
|
||||
=JC/r
|
||||
-----END PGP SIGNATURE-----
|
3
bind-9.18.4.tar.xz
Normal file
3
bind-9.18.4.tar.xz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:f277ae50159a00c300eb926a9c5d51953038a936bd8242d6913dfb6eac42761d
|
||||
size 5395040
|
16
bind-9.18.4.tar.xz.sha512.asc
Normal file
16
bind-9.18.4.tar.xz.sha512.asc
Normal file
@ -0,0 +1,16 @@
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQIzBAABCgAdFiEE4l6wzxzoBJ1H8dmmM+EOShg6jkYFAmKgkj4ACgkQM+EOShg6
|
||||
jkYdrhAAoamVHXA7Jw0VTKMpvoS2UqplPmxdw6Z/Vy+Sk1/ijXaCpQJ4CaCfDXE1
|
||||
N35VAL2YiDOZeyA8zZUrmDXhBneoSZgPQvsa8ADIbpvmyeuhgzy8lLp450q8bM3Z
|
||||
g9SO+cEnX2RYrMnaMDzJR6ERXT4OtUi747ZFKxO/GIvYA9AOWkeTUZZJ4vO2gke9
|
||||
E1TInV8JvxXNu3W31WbkEYg0A9dR7GbqRePTzax9UUzENekVTOZ3P++K0qKILO1D
|
||||
/pe6MjnpQdPbv4J2L6LPD/RTdjB8G6iCDixAka0lD9EimmOb/HnnKMeBJTNeJGFN
|
||||
xdCoTxhUgUwkC7OWTQSoBjbmGFFoIfoeM68/bSHG5EwY4DLBe+z1XR7ExFu/Fp0K
|
||||
3y3qzfTWmPh+zMkoYgqipM6uwyeHBftPJjeexIO0le3I3AvdcqnS0tq79jqpoQ+R
|
||||
3+tmCViJgsEQNZPekNpHB4I6Y3qOpuY81beA0CjcGIIDBDVGz+pb/0Iyl6MXmQ3f
|
||||
4TESVmg+LIRPsPRZfrWkHXWm/MnxJWL2raHLX0ts8tricHX1+71YfsJrgaAPgIGp
|
||||
Scdbee/H5FPCiZ2htxN4vhubHrKk/I6nV2xTBvm6+3vd/Jgjz+r/f1J96sHbOqeZ
|
||||
ROJLefhShuSGNnE8xTPchC34bbst7IqiJ26d/d8WxTivNPcpr0o=
|
||||
=HGhB
|
||||
-----END PGP SIGNATURE-----
|
@ -1,38 +0,0 @@
|
||||
From 921043b54161c7a3e6dc4036b038ca4dbc5fe472 Mon Sep 17 00:00:00 2001
|
||||
From: Evan Hunt <each@isc.org>
|
||||
Date: Fri, 13 May 2022 19:59:58 -0700
|
||||
Subject: [PATCH] prevent a possible buffer overflow in configuration check
|
||||
|
||||
corrected code that could have allowed a buffer overfow while
|
||||
parsing named.conf.
|
||||
---
|
||||
lib/bind9/check.c | 4 ++--
|
||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/lib/bind9/check.c b/lib/bind9/check.c
|
||||
index 658daec76d..baacd29a84 100644
|
||||
--- a/lib/bind9/check.c
|
||||
+++ b/lib/bind9/check.c
|
||||
@@ -3009,8 +3009,8 @@ check_zoneconf(const cfg_obj_t *zconfig, const cfg_obj_t *voptions,
|
||||
} else if (dns_name_isula(zname)) {
|
||||
ula = true;
|
||||
}
|
||||
- tmp += strlen(tmp);
|
||||
len -= strlen(tmp);
|
||||
+ tmp += strlen(tmp);
|
||||
(void)snprintf(tmp, len, "%u/%s", zclass,
|
||||
(ztype == CFG_ZONE_INVIEW) ? target
|
||||
: (viewname != NULL) ? viewname
|
||||
@@ -3719,8 +3719,8 @@ check_zoneconf(const cfg_obj_t *zconfig, const cfg_obj_t *voptions,
|
||||
char *tmp = keydirbuf;
|
||||
size_t len = sizeof(keydirbuf);
|
||||
dns_name_format(zname, keydirbuf, sizeof(keydirbuf));
|
||||
- tmp += strlen(tmp);
|
||||
len -= strlen(tmp);
|
||||
+ tmp += strlen(tmp);
|
||||
(void)snprintf(tmp, len, "/%s", (dir == NULL) ? "(null)" : dir);
|
||||
tresult = keydirexist(zconfig, (const char *)keydirbuf,
|
||||
kaspname, keydirs, logctx, mctx);
|
||||
--
|
||||
GitLab
|
||||
|
23
bind.changes
23
bind.changes
@ -1,3 +1,26 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jun 15 12:37:17 UTC 2022 - Josef Möllers <josef.moellers@suse.com>
|
||||
|
||||
- Upgrade to 9.18.4:
|
||||
Bugs fixed:
|
||||
* Only write key files if the dnssec-policy keymgr has
|
||||
changed the metadata.
|
||||
* When the fetches-per-server quota was adjusted
|
||||
because of an authoritative server timing out more
|
||||
or less frequently, it was incorrectly set to 1
|
||||
rather than the intended value.
|
||||
Notable functional changes:
|
||||
* Key timing options for `dnssec-keygen` and
|
||||
`dnssec-settime` now accept times as printed by
|
||||
`dnssec-settime -p`.
|
||||
* Key timing options for `dnssec-settime` and related
|
||||
utilities now accept "UNSET" times as printed by
|
||||
`dnssec-settime -p`.
|
||||
This obsoletes the following patch:
|
||||
bind-prevent-buffer-overflow.patch
|
||||
[bind-9.18.4.tar.xz, bind-9.18.4.tar.xz.sha512.asc,
|
||||
bind-prevent-buffer-overflow.patch]
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu May 19 07:32:31 UTC 2022 - Josef Möllers <josef.moellers@suse.com>
|
||||
|
||||
|
@ -56,7 +56,7 @@
|
||||
%define _fillupdir %{_localstatedir}/adm/fillup-templates
|
||||
%endif
|
||||
Name: bind
|
||||
Version: 9.18.3
|
||||
Version: 9.18.4
|
||||
Release: 0
|
||||
Summary: Domain Name System (DNS) Server (named)
|
||||
License: MPL-2.0
|
||||
@ -75,7 +75,6 @@ Source70: bind.conf
|
||||
# configuation file for systemd-sysusers
|
||||
Source72: named.conf
|
||||
Patch56: bind-ldapdump-use-valid-host.patch
|
||||
Patch58: bind-prevent-buffer-overflow.patch
|
||||
BuildRequires: libcap-devel
|
||||
BuildRequires: libopenssl-devel
|
||||
BuildRequires: libtool
|
||||
|
Loading…
Reference in New Issue
Block a user