SHA256
1
0
forked from pool/bind

Commit Graph

  • efc0e572f3 Accepting request 523293 from home:msmeissn:branches:network OBS User mrdocs 2017-09-14 01:12:46 +00:00
  • 8decc9c4e9 Accepting request 521995 from network Dominique Leuenberger 2017-09-09 18:23:48 +00:00
  • dcab876062 OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=217 Marcus Meissner 2017-09-07 12:06:06 +00:00
  • 7e6301a923 Accepting request 520246 from home:j-engel:branches:network Marcus Meissner 2017-09-07 12:02:08 +00:00
  • 44f399a675 Accepting request 510389 from network Dominique Leuenberger 2017-07-30 09:21:58 +00:00
  • 70734c6ca6 Accepting request 510278 from home:msmeissn:branches:network Dirk Mueller 2017-07-14 17:29:38 +00:00
  • 29771cc25c Accepting request 507946 from network Dominique Leuenberger 2017-07-04 07:08:41 +00:00
  • 4215a9d83e Accepting request 507735 from home:dimstar:Factory OBS User mrdocs 2017-07-03 22:11:50 +00:00
  • 43448a770a Accepting request 507232 from home:simotek:branches:network Dirk Mueller 2017-06-30 10:58:48 +00:00
  • 076c5e6f0a Accepting request 496968 from network Dominique Leuenberger 2017-05-20 15:55:49 +00:00
  • 7b1425a23f Accepting request 496935 from home:dimstar:Factory Marcus Meissner 2017-05-20 15:34:20 +00:00
  • a34dbd464f Accepting request 482314 from network Yuchen Lin 2017-03-31 13:04:55 +00:00
  • 4e8c935dd7 Accepting request 481339 from home:kukuk:branches:network Marcus Meissner 2017-03-23 16:11:03 +00:00
  • f36624c448 Accepting request 459475 from network Dominique Leuenberger 2017-02-24 23:48:56 +00:00
  • 44c7103fc2 Accepting request 458921 from home:kukuk:branches:network Marcus Meissner 2017-02-21 10:39:18 +00:00
  • fbedf62a14 Accepting request 457428 from network Dominique Leuenberger 2017-02-18 02:15:00 +00:00
  • 9e49836a48 Accepting request 457420 from home:nkukreja:branches:network Navin Kukreja 2017-02-15 13:26:45 +00:00
  • def83543b1 Accepting request 452040 from network Dominique Leuenberger 2017-01-25 21:38:48 +00:00
  • f26d340f7b Accepting request 452036 from home:AndreasStieger:branches:network Dirk Mueller 2017-01-23 20:09:49 +00:00
  • c6ec97ecb6 Accepting request 449784 from home:simotek:branches:network Dirk Mueller 2017-01-12 12:21:22 +00:00
  • 439ef42e37 Accepting request 438333 from network Dominique Leuenberger 2016-11-03 10:11:17 +00:00
  • 318666062f Accepting request 438189 from home:psimons:branches:network Marcus Meissner 2016-11-02 13:30:34 +00:00
  • ea77a151fd Accepting request 430623 from network Dominique Leuenberger 2016-09-28 00:38:15 +00:00
  • 7af14e49dd Accepting request 430610 from home:psimons:branches:network Ismail Dönmez 2016-09-27 18:38:49 +00:00
  • b7bfd06664 Accepting request 404235 from network Dominique Leuenberger 2016-07-01 07:55:03 +00:00
  • 8b99b04f2a - Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483, bsc#963971). - Make /var/lib/named owned by the named user (bsc#908850, bsc#875691). - Call systemd service macros with the full service name. - Security update 9.10.3-P4: Reinhard Max 2016-06-16 12:00:45 +00:00
  • d15631016c Accepting request 390129 from network Dominique Leuenberger 2016-04-30 21:24:51 +00:00
  • 2e4b7daa78 Accepting request 389954 from home:lnussel:branches:network Rusmir Duško 2016-04-15 07:56:29 +00:00
  • 7ad85aecdc Accepting request 370068 from network Dominique Leuenberger 2016-03-18 20:33:29 +00:00
  • 2d8afe69b8 - Security update 9.10.3-P3: * CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure. Reinhard Max 2016-03-11 13:59:03 +00:00
  • abbe73be65 - Security update 9.10.3-P3 fixes two assertion failures that can lead to remote DoS: * CVE-2016-1285, bsc#970072 * CVE-2016-1286, bsc#970073 Reinhard Max 2016-03-11 13:55:29 +00:00
  • c470e3f7b2 Accepting request 361595 from network Dominique Leuenberger 2016-03-01 08:38:53 +00:00
  • 0f06af6f9d Accepting request 361463 from home:bmwiedemann:branches:network Dirk Mueller 2016-02-26 07:55:47 +00:00
  • fd2b586269 Sligthly enhance the last commmit Lars Müller 2016-02-12 21:48:50 +00:00
  • 9508d45935 Accepting request 359100 from home:elvigia:branches:network Lars Müller 2016-02-12 19:11:31 +00:00
  • dfc6526d85 Accepting request 354931 from network Dominique Leuenberger 2016-01-28 16:19:51 +00:00
  • c7dc2ebf4f - Security update 9.10.3-P3: * Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189). * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure (CVE-2015-8705, bsc#962190). * Authoritative servers that were marked as bogus (e.g. blackholed in configuration or with invalid addresses) were being queried anyway. Reinhard Max 2016-01-20 11:04:34 +00:00
  • eaab871f66 Accepting request 350227 from network Dominique Leuenberger 2015-12-23 08:56:59 +00:00
  • 7c65773c2b OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=181 Reinhard Max 2015-12-21 17:51:47 +00:00
  • 5f956be5fc - Update to version 9.10.3-P2 to fix a remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861). Reinhard Max 2015-12-21 17:12:31 +00:00
  • 2fae4c21e5 Accepting request 336452 from network Dominique Leuenberger 2015-10-22 10:56:27 +00:00
  • ee28860376 Accepting request 336332 from home:jengelh:branches:network Reinhard Max 2015-10-05 07:46:26 +00:00
  • a6ded40d51 Accepting request 333033 from network Dominique Leuenberger 2015-10-01 10:21:12 +00:00
  • f17cebd7c5 Accepting request 332971 from home:msmeissn:branches:network Lars Müller 2015-09-22 20:15:47 +00:00
  • 758f271f13 Accepting request 319467 from network Dominique Leuenberger 2015-08-10 07:12:26 +00:00
  • f94eebf621 - Update to version 9.10.2-P3 Security Fixes * A specially crafted query could trigger an assertion failure in message.c. This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795] * On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server. This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795] Bug Fixes * Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] * Several bugs have been fixed in the RPZ implementation: + Policy zones that did not specifically require recursion could be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. This has been corrected. In most configurations, behavioral changes due to this fix will not be noticeable. [RT #39229] + The server could crash if policy zones were updated (e.g. via rndc reload or an incoming zone transfer) while RPZ processing was still ongoing for an active query. [RT #39415] + On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] + The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] + The server could crash if a reload of an RPZ zone was initiated while Lars Müller 2015-07-29 19:36:46 +00:00
  • 523ac751e6 Accepting request 317302 from network Stephan Kulow 2015-07-21 11:26:38 +00:00
  • 5693887a0c - Update to version 9.10.2-P2 - An uninitialized value in validator.c could result in an assertion failure. (CVE-2015-4620) [RT #39795] - Update to version 9.10.2-P1 - Include client-ip rules when logging the number of RPZ rules of each type. [RT #39670] - Addressed further problems with reloading RPZ zones. [RT #39649] - Addressed a regression introduced in change #4121. [RT #39611] - The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] - On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] - A bug in RPZ could cause the server to crash if policy zones were updated while recursion was pending for RPZ processing of an active query. [RT #39415] - Fix a bug in RPZ that could cause some policy zones that did not specifically require recursion to be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. [RT #39229] - Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] - Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn't result in a bug during operation. If the read failed, named could segfault. [RT #38559] Lars Müller 2015-07-10 20:54:40 +00:00
  • c76dd164ae Accepting request 313681 from network Stephan Kulow 2015-07-05 15:58:14 +00:00
  • 2d26a35729 Change log line wrapping. Lars Müller 2015-06-18 13:14:58 +00:00
  • 755db9e738 Accepting request 311393 from home:guohouzuo:freeipa Marcus Meissner 2015-06-18 12:30:16 +00:00
  • 78c996f2f3 Accepting request 305964 from network Stephan Kulow 2015-05-10 08:56:58 +00:00
  • 1ea9273bb0 This change set makes bind build again for SLE 11 too. Lars Müller 2015-05-08 18:11:21 +00:00
  • 44ffc351bb - Update to version 9.10.2 - Handle timeout in legacy system test. [RT #38573] - dns_rdata_freestruct could be called on a uninitialised structure when handling a error. [RT #38568] - Addressed valgrind warnings. [RT #38549] - UDP dispatches could use the wrong pseudorandom number generator context. [RT #38578] - Fixed several small bugs in automatic trust anchor management, including a memory leak and a possible loss of key state information. [RT #38458] - 'dnssec-dsfromkey -T 0' failed to add ttl field. [RT #38565] - Revoking a managed trust anchor and supplying an untrusted replacement could cause named to crash with an assertion failure. (CVE-2015-1349) [RT #38344] - Fix a leak of query fetchlock. [RT #38454] - Fix a leak of pthread_mutexattr_t. [RT #38454] - RPZ could send spurious SERVFAILs in response to duplicate queries. [RT #38510] - CDS and CDNSKEY had the wrong attributes. [RT #38491] - adb hash table was not being grown. [RT #38470] - Update bind.keyring - Update baselibs.conf due to updates to libdns160 and libisc148 Lars Müller 2015-05-08 15:44:01 +00:00
  • fa2687cc7a Accepting request 305950 from home:guohouzuo:freeipa Lars Müller 2015-05-08 14:24:45 +00:00
  • f744db865a Accepting request 285623 from network Dominique Leuenberger 2015-02-13 07:34:47 +00:00
  • a72d9724b3 Accepting request 285468 from home:k0da:branches:network Marcus Meissner 2015-02-11 12:29:20 +00:00
  • 6b0a83c841 Accepting request 282345 from network Dominique Leuenberger 2015-01-22 20:48:52 +00:00
  • 4d1f101c72 added mistakenly deleted row (Request 266520) Andrey Karepin 2015-01-11 18:19:25 +00:00
  • 43ba3368ef Accepting request 266520 from home:jengelh:branches:network Andrey Karepin 2015-01-11 16:14:25 +00:00
  • c183b54c3e Accepting request 264811 from network Dominique Leuenberger 2014-12-19 08:41:28 +00:00
  • ce7779f753 Add lost hyphen to minimize diff with the submit request to factory. Lars Müller 2014-12-11 15:29:03 +00:00
  • 70eef698ee Accepting request 264794 from home:jengelh:branches:network Lars Müller 2014-12-11 14:46:49 +00:00
  • 24da4f54fa Accepting request 264596 from home:lmuelle:bind Lars Müller 2014-12-09 22:47:11 +00:00
  • c38019450e Accepting request 264325 from home:lmuelle:bind Marcus Meissner 2014-12-08 08:18:17 +00:00
  • c1eb80a9c7 - Removed pid-path.diff Marcus Meissner 2014-12-05 10:58:49 +00:00
  • 932f848950 Accepting request 264083 from home:lmuelle:bind Marcus Meissner 2014-12-05 10:12:05 +00:00
  • e179acbc40 Accepting request 261547 from home:dimstar:gpg2 Lars Müller 2014-11-14 10:36:34 +00:00
  • dab82c1e27 Accepting request 253555 from home:jengelh:branches:network Reinhard Max 2014-10-16 14:25:14 +00:00
  • dbf68b7a71 Accepting request 248826 from network Stephan Kulow 2014-09-15 15:40:38 +00:00
  • 48ca52dcbe Accepting request 248172 from home:WernerFink:branches:network Andrey Karepin 2014-09-12 05:49:00 +00:00
  • c0a72d4f0b Accepting request 248035 from home:WernerFink:branches:network Reinhard Max 2014-09-08 14:06:56 +00:00
  • 27153bee19 - Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511). Reinhard Max 2014-09-03 11:44:55 +00:00
  • 40916246e7 - Version 9.9.5P1 also fixes orphan mode (bnc#883859). Reinhard Max 2014-09-03 11:40:39 +00:00
  • 92df98215b Accepting request 243383 from network Stephan Kulow 2014-08-05 08:24:16 +00:00
  • ed559646e6 Accepting request 243329 from home:lmuelle:branches:network Marcus Meissner 2014-08-01 11:43:42 +00:00
  • 367e8d58c7 Accepting request 236023 from network Stephan Kulow 2014-06-05 08:49:37 +00:00
  • 03789a4890 Accepting request 235970 from home:computersalat:devel:network Sascha Peilicke 2014-06-02 09:09:36 +00:00
  • b25ceb6024 Accepting request 235320 from home:elvigia:branches:network Marcus Meissner 2014-06-01 10:06:10 +00:00
  • a718b04e9b Accepting request 233016 from network Stephan Kulow 2014-05-22 18:37:37 +00:00
  • 8dac1c49a4 Re-sync changes file with SLE12. Reinhard Max 2014-05-08 10:01:10 +00:00
  • 9927c8db29 Accepting request 233009 from home:oertel:branches:network Reinhard Max 2014-05-08 09:51:15 +00:00
  • ff2ca456eb Accepting request 215020 from network Stephan Kulow 2014-01-30 18:14:08 +00:00
  • f40daf517b - Add the sdb-ldap backend module (fate#313216). - Details can be found here: * http://bind9-ldap.bayour.com/ * http://bind9-ldap.bayour.com/dnszonehowto.html Reinhard Max 2014-01-24 10:15:48 +00:00
  • 6fa65ad99d unfuzz rpz2-9.9.4.patch Reinhard Max 2014-01-21 17:29:39 +00:00
  • 2280b862ef - Update to version 9.9.4P2 * Fixes named crash when handling malformed NSEC3-signed zones (CVE-2014-0591, bnc#858639) * Obsoletes workaround-compile-problem.diff - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now supported upstream (--enable-rrl). Reinhard Max 2014-01-21 17:09:17 +00:00
  • d26e1590d4 Accepting request 210487 from network Stephan Kulow 2013-12-13 12:01:42 +00:00
  • f61744ed46 Remove createNamedConfInclude~ Reinhard Max 2013-12-09 13:33:42 +00:00
  • c13e4cf96e Fix creation of /etc/named.conf.include . Reinhard Max 2013-12-09 12:23:41 +00:00
  • 82e8a1d0eb Accepting request 186266 from network Tomáš Chvátal 2013-08-10 16:28:25 +00:00
  • e0efd1bf47 - Systemd doesn't set $TERM, and hence breaks tput (bnc#823175). Reinhard Max 2013-08-07 15:23:09 +00:00
  • b255a507e5 - Systemd doesn't set $TERM, and hence breaks tput. Reinhard Max 2013-08-07 15:21:50 +00:00
  • ef9b332868 - Improve pie_compile.diff (bnc#828874). - dnssec-checkds and dnssec-coverage need python-base. - disable rpath in libtool. Reinhard Max 2013-08-06 13:06:41 +00:00
  • 2e7cad6b7d dnssec-checkds and dnssec-coverage need python-base for building. Reinhard Max 2013-08-06 09:11:23 +00:00
  • 28ef07b698 - Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899. * Incorrect bounds checking on private type 'keydata' can lead to a remotely triggerable REQUIRE failure. Reinhard Max 2013-08-05 14:51:21 +00:00
  • b557cafc2b Accepting request 184213 from network Stephan Kulow 2013-07-24 21:30:38 +00:00
  • 8e89b870e6 - Remove non-working apparmor profiles (bnc#740327). Reinhard Max 2013-07-24 15:38:10 +00:00
  • bbd51e19ce Accepting request 183526 from network Stephan Kulow 2013-07-18 13:47:35 +00:00
  • 918e706647 - the README file is not a directory, drop the dir attribute Michael Schröder 2013-07-17 12:09:28 +00:00
  • 0d294dc7c6 Accepting request 181326 from network Stephan Kulow 2013-07-02 04:44:24 +00:00