Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package bind for openSUSE:Factory checked in at 2021-12-06 23:59:13 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/bind (Old) and /work/SRC/openSUSE:Factory/.bind.new.31177 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "bind" Mon Dec 6 23:59:13 2021 rev:174 rq:935520 version:9.16.23 Changes: -------- --- /work/SRC/openSUSE:Factory/bind/bind.changes 2021-12-02 02:10:27.259541018 +0100 +++ /work/SRC/openSUSE:Factory/.bind.new.31177/bind.changes 2021-12-06 23:59:38.616508934 +0100 @@ -1,0 +2,77 @@ +Fri Dec 3 07:52:38 UTC 2021 - Josef M??llers <josef.moell...@suse.com> + +- Upgrade to 9.16.23 + Security issues fixed: + The "lame-ttl" option is now forcibly set to 0. This + effectively disables the lame server cache, as it could + previously be abused by an attacker to significantly + degrade resolver performance. (CVE-2021-25219) + + Bugs fixed: + In 9.16.21: + * When a dynamic zone was made available in another view + using the "in-view" statement, running "rndc freeze" + always reported an "already frozen" error even though + the zone was successfully frozen. + * Stale data in the cache could cause named to send + non-minimized queries despite QNAME minimization being + enabled. + * When a DNSSEC-signed zone which only has a single + signing key available is migrated to use KASP, that key + is now treated as a Combined Signing Key (CSK). + * When a member zone was removed from a catalog zone, + journal files for the former were not deleted. + * named-checkconf failed to detect syntactically invalid + values of the "key" and "tls" parameters used to define + members of remote server lists. + * Fixed a regression which caused the EDNS TCP Keepalive option to be + ignored inadvertently in client requests. It has now + been fixed and this option is handled properly again. + * Fixed a regression which altered the internal memory structure of + zone databases, but neglected to update the MAPAPI value + for zone files in "map" format. This caused named to + attempt to load incompatible map files, triggering an + assertion failure on startup. The MAPAPI value has now + been updated, so named rejects outdated files when + encountering them. + * The thread-local isc_tid_v variable was not properly + initialized when running BIND 9 as a Windows Service, + leading to a crash on startup. + * "map" files exceeding 2GB in size failed to load due to + a size comparison that incorrectly treated the file size + as a signed integer. + In 9.16.22: + * Remove the "adjust interface" mechanism which was + responsible for setting up listeners on interfaces when + the "*-source(-v6)" address and port were the same as + the "listen-on(-v6)" address and port. Such a + configuration is no longer supported; under certain + timing conditions, that mechanism could prevent named + from listening on some TCP ports. This has been fixed. + * Multiple library names were mistakenly passed to the + krb5-config utility when ./configure was invoked with + the --with-gssapi=[/path/to/]krb5-config option. This + has been fixed by invoking krb5-config separately for + each required library. + * Fixed a regression which broke backward compatibility for the + "check-names master ..." and "check-names slave ..." + options. This has been fixed. + * Address a potential deadlock when checking zone content + consistency. + In 9.16.23: + * Address Coverity warning in lib/dns/dnssec.c. + * Fix a bug when comparing two RSA keys. There was a typo + which caused the "p" prime factors to not being + compared. + * Fix an assertion failure caused by missing member zones + during a reload of a catalog zone. + This obsoletes bind-CVE-2021-25219.patch and + bind-fix-build-with-older-sphinx.patch + Other issues: + A compile time waring about fall through in a switch statement + has been averted by marking the cases as FALLTHROUGH. + [bind-9.16.23.tar.xz, bind-9.16.23.tar.xz.sha512.asc, + bind-CVE-2021-25219.patch, bind-fix-build-with-older-sphinx.patch, + bind-avoid-fallthrough-warning-error.patch] + +------------------------------------------------------------------- Old: ---- bind-9.16.20.tar.xz bind-9.16.20.tar.xz.sha512.asc bind-CVE-2021-25219.patch bind-fix-build-with-older-sphinx.patch New: ---- bind-9.16.23.tar.xz bind-9.16.23.tar.xz.sha512.asc bind-avoid-fallthrough-warning-error.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ bind.spec ++++++ --- /var/tmp/diff_new_pack.hCwthc/_old 2021-12-06 23:59:39.332506402 +0100 +++ /var/tmp/diff_new_pack.hCwthc/_new 2021-12-06 23:59:39.336506388 +0100 @@ -46,7 +46,7 @@ %define _fillupdir %{_localstatedir}/adm/fillup-templates %endif Name: bind -Version: 9.16.20 +Version: 9.16.23 Release: 0 Summary: Domain Name System (DNS) Server (named) License: MPL-2.0 @@ -66,8 +66,7 @@ Source72: named.conf Patch52: named-bootconf.diff Patch56: bind-ldapdump-use-valid-host.patch -Patch68: bind-fix-build-with-older-sphinx.patch -Patch69: bind-CVE-2021-25219.patch +Patch57: bind-avoid-fallthrough-warning-error.patch BuildRequires: libcap-devel BuildRequires: libmysqlclient-devel BuildRequires: libopenssl-devel ++++++ bind-9.16.20.tar.xz -> bind-9.16.23.tar.xz ++++++ ++++ 17915 lines of diff (skipped) ++++++ bind-avoid-fallthrough-warning-error.patch ++++++ Index: bind-9.16.23/contrib/dlz/drivers/dlz_ldap_driver.c =================================================================== --- bind-9.16.23.orig/contrib/dlz/drivers/dlz_ldap_driver.c +++ bind-9.16.23/contrib/dlz/drivers/dlz_ldap_driver.c @@ -978,11 +978,13 @@ dlz_ldap_create(const char *dlzname, uns if (result != ISC_R_SUCCESS) { return (result); } + /* FALLTHROUGH */ case 11: result = dlz_ldap_checkURL(argv[10], 3, "all nodes"); if (result != ISC_R_SUCCESS) { return (result); } + /* FALLTHROUGH */ case 10: if (strlen(argv[9]) > 0) { result = dlz_ldap_checkURL(argv[9], 3, "authority"); @@ -990,6 +992,7 @@ dlz_ldap_create(const char *dlzname, uns return (result); } } + /* FALLTHROUGH */ case 9: result = dlz_ldap_checkURL(argv[8], 3, "lookup"); if (result != ISC_R_SUCCESS) {