diff --git a/.files b/.files index 060cee1..a4366b4 100644 Binary files a/.files and b/.files differ diff --git a/.rev b/.rev index fcef618..f56866e 100644 --- a/.rev +++ b/.rev @@ -216,4 +216,12 @@ 812023 + + 93ba96e92a6b8b79462776c2e92c4c14 + 1.6.0 + + dimstar_suse + + 814744 + diff --git a/adns-1.5.1-gcc10.patch b/adns-1.5.1-gcc10.patch deleted file mode 100644 index cefefe0..0000000 --- a/adns-1.5.1-gcc10.patch +++ /dev/null @@ -1,15 +0,0 @@ -diff -up adns-1.5.1/src/event.c.me adns-1.5.1/src/event.c -diff -up adns-1.5.1/src/internal.h.me adns-1.5.1/src/internal.h ---- adns-1.5.1/src/internal.h.me 2020-02-18 13:54:38.578415675 +0100 -+++ adns-1.5.1/src/internal.h 2020-02-18 14:00:26.398198338 +0100 -@@ -246,7 +246,9 @@ union maxalign { - void *p; - void (*fp)(void); - union maxalign *up; --} data; -+}; -+ -+extern union maxalign data; - - struct adns__query { - adns_state ads; diff --git a/adns-1.5.1.tar.gz b/adns-1.5.1.tar.gz deleted file mode 120000 index 8f992c3..0000000 --- a/adns-1.5.1.tar.gz +++ /dev/null @@ -1 +0,0 @@ -/ipfs/bafybeigv6knzze5tgnhcnf2n3ugm3ws3lmxta32kwunvaax3zsp4l3ho7e \ No newline at end of file diff --git a/adns-1.5.1.tar.gz.sig b/adns-1.5.1.tar.gz.sig deleted file mode 100644 index 0e6b892..0000000 Binary files a/adns-1.5.1.tar.gz.sig and /dev/null differ diff --git a/adns-1.6.0.tar.gz b/adns-1.6.0.tar.gz new file mode 120000 index 0000000..a1e1470 --- /dev/null +++ b/adns-1.6.0.tar.gz @@ -0,0 +1 @@ +/ipfs/bafybeigioxnb6vzmcftzvzovoodshfq556lzfply6ue7qmnrdd3h672r5m \ No newline at end of file diff --git a/adns-1.6.0.tar.gz.sig b/adns-1.6.0.tar.gz.sig new file mode 100644 index 0000000..6f01b21 Binary files /dev/null and b/adns-1.6.0.tar.gz.sig differ diff --git a/adns-visibility.patch b/adns-visibility.patch index ac47845..d9e902a 100644 --- a/adns-visibility.patch +++ b/adns-visibility.patch @@ -24,8 +24,8 @@ Index: src/internal.h +#pragma GCC visibility push(hidden) /* Configuration and constants */ - #define MAXSERVERS 5 -@@ -944,4 +945,5 @@ static inline int errno_resources(int e) + #define MAXSERVERS 5 /* do not increase beyond no. of bits in `unsigned'! */ +@@ -960,4 +961,5 @@ static inline int errno_resources(int e) (tv)|=GETIL_B(cb), \ (tv) ) diff --git a/adns.changes b/adns.changes index 32974f4..b37f0c2 100644 --- a/adns.changes +++ b/adns.changes @@ -1,4 +1,62 @@ ------------------------------------------------------------------- +Mon Jun 15 12:40:37 UTC 2020 - Kristyna Streitova + +- Update to 1.6.0 +- Changes in 1.6.0: + * Bugfixes + * adnshost: Support --reverse in -f mode input stream + * timeout robustness against clock skew: track query start time and + duration. Clock instability may now only cause spurious timeouts + rather than indefinite hangs or even assertion failures. + * New features: + * adnshost: Offer ability to set adns checkc flags + * adnslogres: Honour --checkc-freq (if it comes first) + * adnsresfilter: Honour --checkc-freq and --checkc-entex + * time handling: Support use of CLOCK_MONOTONIC via an init flag. + * adns_str* etc.: Improve robustness; more allowable inputs values. + * Internal changes: + * adnshost: adh-opts.c: Whitespace adjustments to option table + * Build system and tests improvements +- Changes in 1.5.2 + * Important security fixes: + CVE-2017-9103 CVE-2017-9104 CVE-2017-9105 CVE-2017-9109: + Vulnerable applications: all adns callers. + Exploitable by: the local recursive resolver. + Likely worst case: Remote code execution. + CVE-2017-9106: + Vulnerable applications: those that make SOA queries. + Exploitable by: upstream DNS data sources. + Likely worst case: DoS (crash of the adns-using application) + CVE-2017-9107: + Vulnerable applications: those that use adns_qf_quoteok_query. + Exploitable by: sources of query domain names. + Likely worst case: DoS (crash of the adns-using application) + CVE-2017-9108: + Vulnerable applications: adnshost. + Exploitable by: code responsible for framing the input. + Likely worst case: DoS (adnshost crashes at EOF). + * Bugfixes: + * Do not include spurious external symbol `data' (fixes GCC10 build). + * If server sends TC flag over TCP, bail rather than retrying. + * Do not crash on certain strange resolv.conf contents. + * Fix various crashes if a global system failure occurs, or + adns_finish is called with outstanding queries. + * Correct a parsing error message very slightly. + * DNS packet parsing: Slight fix when packet is truncated. + * Fix ABI compatibility in string conversion of certain RR types. + * internal.h: Use `unsigned' for nextid; fixes theoretical C UB. + * Portability fix: + * common.make.in: add -Wno-unused-value. Fixes build with GCC9. + * Internal changes: + * Additional comments describing some internal code restrions. + * Robustness assert() against malfunctioning write() system call. +- It fixes the following CVEs [bsc#1172265] + CVE-2017-9103, CVE-2017-9104, CVE-2017-9105, CVE-2017-9106, + CVE-2017-9107, CVE-2017-9108, CVE-2017-9109 +- refresh adns-visibility.patch +- drop adns-1.5.1-gcc10.patch that is no longer needed + +------------------------------------------------------------------- Tue Jun 2 12:48:11 UTC 2020 - Kristyna Streitova - add adns-1.5.1-gcc10.patch to fix build with GCC10 diff --git a/adns.spec b/adns.spec index f2a974d..3a2c1cf 100644 --- a/adns.spec +++ b/adns.spec @@ -18,7 +18,7 @@ %define lname libadns1 Name: adns -Version: 1.5.1 +Version: 1.6.0 Release: 0 Summary: Advanced Easy-to-Use Asynchronous-Capable DNS Utilities License: GPL-2.0-or-later @@ -32,7 +32,6 @@ Source4: baselibs.conf Patch0: adns-1.4-destdir.patch Patch1: adns-1.4-configure.patch Patch2: adns-visibility.patch -Patch3: adns-1.5.1-gcc10.patch BuildRequires: autoconf %description @@ -64,7 +63,6 @@ programs with libads support. %patch0 %patch1 %patch2 -%patch3 -p1 cp %{SOURCE3} . %build @@ -73,7 +71,12 @@ autoreconf -fiv %make_build all %install -%make_install +make install \ + prefix=%{buildroot}%{_prefix} \ + bindir=%{buildroot}%{_bindir} \ + includedir=%{buildroot}%{_includedir} \ + libdir=%{buildroot}%{_libdir} \ + # FIXME: --disable-static not available rm %{buildroot}%{_libdir}/*.a