22552124 Upgrade BIND to 9.6-ESV-R11-P5 s11u3-sru
authorStacey Marshall <Stacey.Marshall@Oracle.COM>
Tue, 26 Jan 2016 09:15:22 +0000
branchs11u3-sru
changeset 5336 4e1f71a3fa7a
parent 5329 901296430eab
child 5337 873e22a2b4cc
22552124 Upgrade BIND to 9.6-ESV-R11-P5 22551813 problem in SERVICE/DNS-SERVER
components/bind/Makefile
components/bind/patches/005-RT9522.patch
--- a/components/bind/Makefile	Mon Jan 25 14:55:32 2016 -0800
+++ b/components/bind/Makefile	Tue Jan 26 09:15:22 2016 +0000
@@ -18,14 +18,14 @@
 #
 # CDDL HEADER END
 #
-# Copyright (c) 2011, 2015, Oracle and/or its affiliates. All rights reserved.
+# Copyright (c) 2011, 2016, Oracle and/or its affiliates. All rights reserved.
 #
 include ../../make-rules/shared-macros.mk
 
 COMPONENT_NAME=		bind
 COMPONENT_VERSION=	9.6-ESV-R11
-HUMAN_VERSION=		$(COMPONENT_VERSION)-P4
-IPS_COMPONENT_VERSION=	9.6.3.11.4
+HUMAN_VERSION=		$(COMPONENT_VERSION)-P5
+IPS_COMPONENT_VERSION=	9.6.3.11.5
 COMPONENT_SRC=		$(COMPONENT_NAME)-$(COMPONENT_VERSION)
 COMPONENT_ARCHIVE=	$(COMPONENT_SRC).tar.gz
 COMPONENT_PROJECT_URL=	http://www.isc.org/software/bind/
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/components/bind/patches/005-RT9522.patch	Tue Jan 26 09:15:22 2016 +0000
@@ -0,0 +1,44 @@
+This patch was derived from ISC source differences between bind-9.10.3-P2 and bind-9.10.3-P3
+
+diff -r f899dcaa07f7 CHANGES
+--- a/CHANGES	Fri Jan 15 12:48:27 2016 +0000
++++ b/CHANGES	Fri Jan 15 13:12:34 2016 +0000
[email protected]@ -1,3 +1,8 @@
++	--- 9.6-ESV-R11-P5 released ---
++
++4285.	[security]	Specific APL data could trigger a INSIST.
++			(CVE-2015-8704) [RT #41396]
++
+ 	--- 9.6-ESV-R11-P4 released ---
+ 
+ 4260.	[security]	Insufficient testing when parsing a message allowed
+diff -r f899dcaa07f7 lib/dns/rdata/in_1/apl_42.c
+--- a/lib/dns/rdata/in_1/apl_42.c	Fri Jan 15 12:48:27 2016 +0000
++++ b/lib/dns/rdata/in_1/apl_42.c	Fri Jan 15 13:12:34 2016 +0000
[email protected]@ -116,7 +116,7 @@
+ 	isc_uint8_t len;
+ 	isc_boolean_t neg;
+ 	unsigned char buf[16];
+-	char txt[sizeof(" !64000")];
++	char txt[sizeof(" !64000:")];
+ 	const char *sep = "";
+ 	int n;
+ 
[email protected]@ -140,7 +140,7 @@
+ 		isc_region_consume(&sr, 1);
+ 		INSIST(len <= sr.length);
+ 		n = snprintf(txt, sizeof(txt), "%s%s%u:", sep,
+-			     neg ? "!": "", afi);
++			     neg ? "!" : "", afi);
+ 		INSIST(n < (int)sizeof(txt));
+ 		RETERR(str_totext(txt, target));
+ 		switch (afi) {
+diff -r f899dcaa07f7 version
+--- a/version	Fri Jan 15 12:48:27 2016 +0000
++++ b/version	Fri Jan 15 13:12:34 2016 +0000
[email protected]@ -10,4 +10,4 @@
+ PATCHVER=
+ RELEASETYPE=-ESV
+ RELEASEVER=-R11
+-EXTENSIONS=-P4
++EXTENSIONS=-P5