- Updated to 9.9.2-P1 (bnc#792926)
https://kb.isc.org/article/AA-00828 * Security Fixes Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=107
This commit is contained in:
parent
4161728e00
commit
636c118d37
3
bind-9.9.2-P1.tar.gz
Normal file
3
bind-9.9.2-P1.tar.gz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:4bce7c020402623333b655be5167ae8c52f30a6bfe9750caa3ab70da7d90219c
|
||||||
|
size 7277498
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:7e6530b198d512e27a856bbd7426b1a3c47fd55d06d667adb66f760259009b48
|
|
||||||
size 7285050
|
|
156
bind.changes
156
bind.changes
@ -1,3 +1,159 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Dec 6 08:00:31 UTC 2012 - meissner@suse.com
|
||||||
|
|
||||||
|
- Updated to 9.9.2-P1 (bnc#792926)
|
||||||
|
https://kb.isc.org/article/AA-00828
|
||||||
|
* Security Fixes
|
||||||
|
|
||||||
|
Prevents named from aborting with a require assertion failure on
|
||||||
|
servers with DNS64 enabled. These crashes might occur as a result of
|
||||||
|
specific queries that are received. (Note that this fix is a subset
|
||||||
|
of a series of updates that will be included in full in BIND 9.8.5
|
||||||
|
and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792]
|
||||||
|
|
||||||
|
A deliberately constructed combination of records could cause
|
||||||
|
named to hang while populating the additional section of a
|
||||||
|
response. [CVE-2012-5166] [RT #31090]
|
||||||
|
|
||||||
|
Prevents a named assert (crash) when queried for a record whose
|
||||||
|
RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416]
|
||||||
|
|
||||||
|
Prevents a named assert (crash) when validating caused by using
|
||||||
|
"Bad cache" data before it has been initialized. [CVE-2012-3817]
|
||||||
|
[RT #30025]
|
||||||
|
|
||||||
|
A condition has been corrected where improper handling of zero-length
|
||||||
|
RDATA could cause undesirable behavior, including termination of
|
||||||
|
the named process. [CVE-2012-1667] [RT #29644]
|
||||||
|
|
||||||
|
ISC_QUEUE handling for recursive clients was updated to address a race
|
||||||
|
condition that could cause a memory leak. This rarely occurred with
|
||||||
|
UDP clients, but could be a significant problem for a server handling
|
||||||
|
a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233]
|
||||||
|
|
||||||
|
New Features
|
||||||
|
|
||||||
|
Elliptic Curve Digital Signature Algorithm keys and signatures in
|
||||||
|
DNSSEC are now supported per RFC 6605. [RT #21918]
|
||||||
|
|
||||||
|
Introduces a new tool "dnssec-checkds" command that checks a zone to
|
||||||
|
determine which DS records should be published in the parent zone,
|
||||||
|
or which DLV records should be published in a DLV zone, and queries
|
||||||
|
the DNS to ensure that it exists. (Note: This tool depends on python;
|
||||||
|
it will not be built or installed on systems that do not have a
|
||||||
|
python interpreter.) [RT #28099]
|
||||||
|
|
||||||
|
Introduces a new tool "dnssec-verify" that validates a signed zone,
|
||||||
|
checking for the correctness of signatures and NSEC/NSEC3 chains.
|
||||||
|
[RT #23673]
|
||||||
|
|
||||||
|
Adds configuration option "max-rsa-exponent-size <value>;" that
|
||||||
|
can be used to specify the maximum rsa exponent size that will be
|
||||||
|
accepted when validating [RT #29228]
|
||||||
|
|
||||||
|
Feature Changes
|
||||||
|
|
||||||
|
Improves OpenSSL error logging [RT #29932]
|
||||||
|
nslookup now returns a nonzero exit code when it is unable to get
|
||||||
|
an answer. [RT #29492]
|
||||||
|
|
||||||
|
Bug Fixes
|
||||||
|
|
||||||
|
Uses binary mode to open raw files on Windows. [RT #30944]
|
||||||
|
When using DNSSEC inline signing with "rndc signing -nsec3param", a
|
||||||
|
salt value of "-" can now be used to indicate 'no salt'. [RT #30099]
|
||||||
|
Prevents race conditions (address use after free) that could be
|
||||||
|
encountered when named is shutting down and releasing structures
|
||||||
|
used to manage recursive clients. [RT #30241]
|
||||||
|
Static-stub zones now accept "forward" and "fowarders" options
|
||||||
|
(often needed for subdomains of the zone referenced to override
|
||||||
|
global forwarding options). These options are already available
|
||||||
|
with traditional stub zones and their omission from zones of type
|
||||||
|
"static-stub" was an inadvertent oversight. [RT #30482]
|
||||||
|
Limits the TTL of signed RRsets in cache when their RRSIGs are
|
||||||
|
approaching expiry. This prevents the persistence in cache of
|
||||||
|
invalid RRSIGs in order to assist recovery from a situation where
|
||||||
|
zone re-signing doesn't occur in a timely manner. With this change,
|
||||||
|
named will attempt to obtain new RRSIGs from the authoritative server
|
||||||
|
once the original ones have expired, and even if the TTL of the old
|
||||||
|
records would in other circumstances cause them to be kept in cache
|
||||||
|
for longer. [RT #26429]
|
||||||
|
Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg()
|
||||||
|
which are employed on Itanium systems to speed up lock management
|
||||||
|
by making use of atomic operations. Without the syntax correction
|
||||||
|
it is possible that concurrent access to the same structures could
|
||||||
|
accidentally occur with unpredictable results. [RT #25181]
|
||||||
|
Improves OpenSSL error logging [RT #29932]
|
||||||
|
The configure script now supports and detects libxml2-2.8.x correctly
|
||||||
|
[RT #30440]
|
||||||
|
The host command should no longer assert on some architectures
|
||||||
|
and builds while handling the time values used with the -w (wait
|
||||||
|
forever) option. [RT #18723]
|
||||||
|
Invalid zero settings for max-retry-time, min-retry-time,
|
||||||
|
max-refresh-time, min-refresh-time will now be detected during parsing
|
||||||
|
of named.conf and an error emitted instead of triggering an assertion
|
||||||
|
failure on startup. [RT #27730]
|
||||||
|
Removes spurious newlines from log messages in zone.c [RT #30675]
|
||||||
|
When built with readline support (i.e. on a system with readline
|
||||||
|
installed) nsupdate no longer terminates unexpectedly in interactive
|
||||||
|
mode. [RT #29550]
|
||||||
|
All named tasks that perform task-exclusive operations now share the
|
||||||
|
same single task. Prior to this change, there was the possibility of
|
||||||
|
a race condition between rndc operations and other functions such as
|
||||||
|
re-sizing the adb hash table. If the race condition was encountered,
|
||||||
|
named would in most cases terminate unexpectedly with an assert.
|
||||||
|
[RT #29872]
|
||||||
|
Ensures that servers are expired from the ADB cache when the timeout
|
||||||
|
limit is reached so that their learned attributes can be refreshed.
|
||||||
|
Prior to this change, servers that were frequently queried might
|
||||||
|
never have their entries removed and reinitialized. This is of
|
||||||
|
particular importance to DNSSEC-validating recursive servers that
|
||||||
|
might erroneously set "no-edns" for an authoritative server following
|
||||||
|
a period of intermittent connectivity. [RT #29856]
|
||||||
|
Adds additional resilience to a previous security change (3218) by
|
||||||
|
preventing RRSIG data from being added to cache when a pseudo-record
|
||||||
|
matching the covering type and proving non-existence exists at a
|
||||||
|
higher trust level. The earlier change prevented this inconsistent
|
||||||
|
data from being retrieved from cache in response to client queries -
|
||||||
|
with this additional change, the RRSIG records are no longer inserted
|
||||||
|
into cache at all. [RT #26809]
|
||||||
|
dnssec-settime will now issue a warning when the writing of a new
|
||||||
|
private key file would cause a change in the permissions of the
|
||||||
|
existing file. [RT #27724]
|
||||||
|
Fixes the defect introduced by change #3314 that was causing failures
|
||||||
|
when saving stub zones to disk (resulting in excessive CPU usage in
|
||||||
|
some cases). [RT #29952]
|
||||||
|
Address race condition in units tests: asyncload_zone and
|
||||||
|
asyncload_zt. [RT #26100]
|
||||||
|
It is now possible to using multiple control keys again - this
|
||||||
|
functionality was inadvertently broken by change #3924 (RT #28265)
|
||||||
|
which addressed a memory leak. [RT #29694]
|
||||||
|
Named now holds a zone table reference while performing an
|
||||||
|
asynchronous load of a zone. This removes a race condition that
|
||||||
|
could cause named to crash when zones are added using rndc addzone
|
||||||
|
or by manually editing named's configuration file followed by rndc
|
||||||
|
reconfig/reload. [RT #28326]
|
||||||
|
Setting resolver-query-timeout too low could cause named problems
|
||||||
|
recovering after a loss of connectivity. [RT #29623]
|
||||||
|
Reduces the potential build-up of stale RRsets in cache on a busy
|
||||||
|
recursive nameserver by re-using cached DS and RRSIG rrsets when
|
||||||
|
possible [RT #29446]
|
||||||
|
Corrects a failure to authenticate non-existence of resource records
|
||||||
|
in some circumstances when RPZ has been configured. Also:
|
||||||
|
adds an optional "recursive-only yes|no" to the response-policy
|
||||||
|
statement
|
||||||
|
adds an optional "max-policy-ttl" to the response-policy statement
|
||||||
|
to limit the false data that "recursive-only no" can introduce
|
||||||
|
into resolvers' caches
|
||||||
|
introduces a predefined encoding of PASSTHRU policy by adding
|
||||||
|
"rpz-passthru" to be used as the target of CNAME policy records
|
||||||
|
(the old encoding is still accepted.)
|
||||||
|
adds a RPZ performance test to bin/tests/system/rpz when queryperf is available. [RT #26172]
|
||||||
|
Upper-case/lower-case handling of RRSIG signer-names is now handled
|
||||||
|
consistently: RRSIG records are generated with the signer-name in
|
||||||
|
lower case. They are accepted with any case, but if they fail to
|
||||||
|
validate, we try again in lower case. [RT #27451]
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Sun Nov 18 18:12:08 UTC 2012 - meissner@suse.com
|
Sun Nov 18 18:12:08 UTC 2012 - meissner@suse.com
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
Name: bind
|
Name: bind
|
||||||
%define pkg_name bind
|
%define pkg_name bind
|
||||||
%define pkg_vers 9.9.2
|
%define pkg_vers 9.9.2-P1
|
||||||
BuildRequires: krb5-devel
|
BuildRequires: krb5-devel
|
||||||
BuildRequires: libcap
|
BuildRequires: libcap
|
||||||
BuildRequires: libcap-devel
|
BuildRequires: libcap-devel
|
||||||
@ -32,7 +32,7 @@ BuildRequires: update-desktop-files
|
|||||||
Summary: Domain Name System (DNS) Server (named)
|
Summary: Domain Name System (DNS) Server (named)
|
||||||
License: ISC
|
License: ISC
|
||||||
Group: Productivity/Networking/DNS/Servers
|
Group: Productivity/Networking/DNS/Servers
|
||||||
Version: 9.9.2
|
Version: 9.9.2P1
|
||||||
Release: 0
|
Release: 0
|
||||||
Provides: bind8
|
Provides: bind8
|
||||||
Provides: bind9
|
Provides: bind9
|
||||||
|
Loading…
Reference in New Issue
Block a user