Package Release Info

ldns-1.7.0-4.6.1

Update Info: Base Release
Available in Package Hub : 15 SP4 Subpackages

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

ldns
ldns-debuginfo
ldns-debugsource

Change Logs

* Tue Feb 01 2022 adam.majer@suse.de
- bsc_1195057.patch - Fixes heap-based out of bounds read when
  verifying a zone file (bsc#1195057, CVE-2020-19860)
- bsc_1195058.patch - Fixes heap-based out of bounds read in
  ldns_nsec3_salt_data() (bsc#1195058, CVE-2020-19861)
* Mon Mar 23 2020 adam.majer@suse.de
- bsc_1068709.patch: Fixes a double-free vulnerability
  (bsc#1068709, CVE-2017-1000232)
- bsc_1068711.patch: Fixes a buffer overflow during token parsing
  (bsc#1068711, CVE-2017-1000231)
* Mon Jan 08 2018 tchvatal@suse.com
- Switch directly to python3 in order for us to proceed with py2
  obsoletion for future releases
  * Upstream sadly can build only against one of the two
* Thu Nov 16 2017 vcizek@suse.com
- disable DANE verification when building with openssl < 1.1 to fix
  build on distributions that have openssl 1.0.x
* Sun Aug 27 2017 jengelh@inai.de
- Update descriptions.
* Fri Aug 18 2017 pmonrealgonzalez@suse.com
- Update to version 1.7.0
  * Ldns built with openssl-1.1.0 [bsc#1042653]
  * Fix #551 change Regent to Copyright holder in BSD license in some of
    the headings of the file, to match the opensource.org BSD license.
  * -e option makes ldns-compare-zones exit with status code 2 on difference
  * Filter out specified RR types with ldns-read-zone -e and -E options
  * bugfix #563: Correct DNSKEY from DSA private key.
  * bugfix #562: ldns-keygen match DSA key maximum size with library.
    And check keysizes with all algorithms.
  * ldns-verify-zone accepts only one single zonefile as argument.
  * bugfix #573: ldns-keygen write private keys with mode 0600.
  * Fix configure to make ldns compile with LibreSSL 2.0
  * drill now also accepts dig style -y option
    (-y <[algo:]name:key> i.s.o. -y <name:key[:algo]>)
  * OPENPGPKEY draft rr types. Enable with: --enable-rrtype-openpgpkey
  * bugfix #608: Correct comment about escaped characters
  * CDS and CDNSKEY rr type from RFC 7344. --enable-rrtype-cds configure
    option removed
  * fix: Memory leak in ldns_pkt_rr_list_by_name()
  * fix: Memory leak in ldns_dname2buffer_wire_compress()
  * bugfix #613: Allow tab as whitespace too in last rdata field of types
    of variable length.
  * bugfix: strip trailing whitespace from $ORIGIN lines in zone files
  * Let ldns-keygen output .ds files only for KSK keys
  * Parse RFC7218 TLSA mnemonics, but do not output them
  * Let ldns-dane use SPKI as the default selector i.s.o. Cert
  * bugfix: Fit left over NSEC3s once more before adding empty non terminals
  * bugfix #605: Determine default trust anchor location at compile time
  * bugfix #697: Double free with ldns-dane create
  * bugfix #623: Do not redefine bool type and boolean values
  * bugfix #570: Add TLSA, CDS, CDNSKEY and OPENPGPKEY RR types to ldnsx
  * bugfix #575: ldns_pkt_clone() does not copy timestamp field
  * bugfix #584: ldns-update fixes.  Send update to port 53, bring manpage
    in sync with the usage text, and don't alter the ldns_resolver passed
    to ldns_update_soa_zone_mname(). Created a ldns_resolver_clone()
    function in the process.
  * bugfix #633: ldns_pkt_clone() parameter isn't const.
  * bugfix: ldns-dane manpage correction
  * RFC7553 RR Type URI is supported by default.
  * Fix ECDSA signature generation, do not omit leading zeroes.
  * bugfix: Get rid of superfluous newline in ldns-keyfetcher
  * bugfix: -U option to ldns-signzone to sign with every algorithm
  * const function parameters whenever possible.
  * bugfix #725: allow RR-types on the type bitmap window border
  * Add type CSYNC support, RFC 7477.
  * Prepare for ED25519, ED448 support: todo convert* routines in dnssec.h,
    once openssl has support for signing with these algorithms. The dns
    algorithm number is not yet allocated. These features are not fully
    implemented yet, openssl (1.1) does not support the algorithms enough
    to generate keys and sign and verify with them.
  * Fix drill axfr ipv4/ipv6 queries.
  * Fix for openssl 1.1.0 API changes.
  * bugfix #825: Module import breaks with newer SWIG versions.
  * bugfix #769: Add support for :: in an IPv6 address
  * bugfix #708: warnings and errors with xcode 6.1/7.0
  * bugfix #754: Memory leak in ldns_str2rdf_ipseckey
  * bugfix #661: Fail NSEC3 signing when NSEC domainname length would
    overflow.
  * bugfix #771: hmac-sha224, hmac-sha384 and hmac-sha512 keys.
  * bugfix #680: ldns fails to reject invalidly formatted RFC 7553 URI RRs.
  * bugfix #678: Use poll i.s.o. select to support > 1024 fds
  * Use OpenSSL DANE functions for verification (unless explicitly disabled
    with --disable-dane-ta-usage).
  * Bumb .so version
  * Include OPENPGPKEY RR type by default
  * rdata processing for SMIMEA RR type
  * Fix crash in displaying TLSA RR's.
  * Update ldns-key2ds man page to mention GOST and SHA384 hash functions.
  * Add sha384 and sha512 tsig algorithm.
  * Clarify data ownership with consts for tsig parameters.
  * bugfix: Fix detection of DSA support with OpenSSL >= 1.1.0
  * bugfix #1160: Provide sha256 for release tarballs
  * --enable-gost-anyway compiles GOST support with OpenSSL >= 1.1.0 even
    when the GOST engine is not available.
- Dropped patch ldns-perl-5.22.patch
* Tue May 10 2016 mrueckert@suse.de
- disable python because the bindings dont match the old python
  version either
* Tue May 10 2016 mrueckert@suse.de
- disable perl on sle11 as it needs at least 5.14.2
* Tue May 10 2016 mrueckert@suse.de
- fix building on SLE11 by disabling gost
* Tue Sep 01 2015 dimstar@opensuse.org
- Add ldns-perl-5.22.patch: Fix build with perl 5.22.