Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libadns-devel | Distribution: SUSE Linux Enterprise 15 |
Version: 1.6.0 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 150400.1.7 | Build date: Sat May 7 23:40:58 2022 |
Group: Development/Languages/C and C++ | Build host: s390zl38 |
Size: 43527 | Source RPM: adns-1.6.0-150400.1.7.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://www.chiark.greenend.org.uk/~ian/adns/ftp/ | |
Summary: Libraries and header files to develop programs with libadns support |
Libadns-devel includes the header file and static library to develop programs with libads support.
GPL-2.0-or-later
* Mon Jun 15 2020 kstreitova@suse.com - Update to 1.6.0 - Changes in 1.6.0: * Bugfixes * adnshost: Support --reverse in -f mode input stream * timeout robustness against clock skew: track query start time and duration. Clock instability may now only cause spurious timeouts rather than indefinite hangs or even assertion failures. * New features: * adnshost: Offer ability to set adns checkc flags * adnslogres: Honour --checkc-freq (if it comes first) * adnsresfilter: Honour --checkc-freq and --checkc-entex * time handling: Support use of CLOCK_MONOTONIC via an init flag. * adns_str* etc.: Improve robustness; more allowable inputs values. * Internal changes: * adnshost: adh-opts.c: Whitespace adjustments to option table * Build system and tests improvements - Changes in 1.5.2 * Important security fixes: CVE-2017-9103 CVE-2017-9104 CVE-2017-9105 CVE-2017-9109: Vulnerable applications: all adns callers. Exploitable by: the local recursive resolver. Likely worst case: Remote code execution. CVE-2017-9106: Vulnerable applications: those that make SOA queries. Exploitable by: upstream DNS data sources. Likely worst case: DoS (crash of the adns-using application) CVE-2017-9107: Vulnerable applications: those that use adns_qf_quoteok_query. Exploitable by: sources of query domain names. Likely worst case: DoS (crash of the adns-using application) CVE-2017-9108: Vulnerable applications: adnshost. Exploitable by: code responsible for framing the input. Likely worst case: DoS (adnshost crashes at EOF). * Bugfixes: * Do not include spurious external symbol `data' (fixes GCC10 build). * If server sends TC flag over TCP, bail rather than retrying. * Do not crash on certain strange resolv.conf contents. * Fix various crashes if a global system failure occurs, or adns_finish is called with outstanding queries. * Correct a parsing error message very slightly. * DNS packet parsing: Slight fix when packet is truncated. * Fix ABI compatibility in string conversion of certain RR types. * internal.h: Use `unsigned' for nextid; fixes theoretical C UB. * Portability fix: * common.make.in: add -Wno-unused-value. Fixes build with GCC9. * Internal changes: * Additional comments describing some internal code restrions. * Robustness assert() against malfunctioning write() system call. - It fixes the following CVEs [bsc#1172265] CVE-2017-9103, CVE-2017-9104, CVE-2017-9105, CVE-2017-9106, CVE-2017-9107, CVE-2017-9108, CVE-2017-9109 - refresh adns-visibility.patch - drop adns-1.5.1-gcc10.patch that is no longer needed * Tue Jun 02 2020 kstreitova@suse.com - add adns-1.5.1-gcc10.patch to fix build with GCC10 - run spec-cleaner * Sat Nov 04 2017 aavindraa@gmail.com - Update to 1.5.1 * Fix addr queries (including subqueries, ie including deferencing MX lookups etc.) not to crash when one of the address queries returns tempfail. Also, do not return a spurious pointer to the application when one of the address queries returns a permanent error (although, the application almost certainly won't use this pointer because the associated count is zero). * Portability fix for systems where socklen_t is bigger than int. * Fix for malicious optimisation of memcpy in test suite, which causes failure with gcc-4.1.9 -O3. * Fix TCP async connect handling. The bug is hidden on Linux and on most systems where the nameserver is on localhost. If it is not hidden, adns's TCP support is broken unless adns_if_noautosys is used. * adnsresfilter: Fix addrtextbuf buffer size. This is not actually a problem in real compiled code but should be corrected. * Properly include harness.h in adnstest.c in regress/. Suppresses a couple of compiler warnings (implicit declaration of Texit, etc.) - cleanup with spec-cleaner * Thu Mar 23 2017 kstreitova@suse.com - cleanup with spec-cleaner - get rid of %{name} macro in the patch name - restart patch numbering * Mon Mar 02 2015 mpluskal@suse.com - Remove obsolete patches * adns-ocloexec.patch * adns-1.4-ipv6.patch - Add gpg signature - Cleanup spec-file with spec-cleaner - Remove already disabled %check section, tests require working network setup - Update to 1.5.0 * This release provides full IPv6 support. Applications can request AAAA records (containing IPv6 addresses) as well as, or instead of, A records (containing IPv4 addresses). adns 1.5 can speak to nameservers over IPv6. * converting between addresses and address literals. These carry less baggage than getaddrinfo and getnameinfo. * bugfixes and other minor changes (see changelog for details) * Tue Jun 11 2013 crrodriguez@opensuse.org - remove debug statement in the spec file, leftover from previous change. * Mon Jun 10 2013 crrodriguez@opensuse.org - Build with large file support in 32 bit archs, autoconf stuff is fine, but C files included config.h after C library headers, therefore no prototypes for *64 functions found. * Wed Mar 20 2013 mmeister@suse.com - Added download url as source. Please see http://en.opensuse.org/SourceUrls * Tue Dec 20 2011 coolo@suse.com - add autoconf as buildrequire to avoid implicit dependency * Tue Nov 22 2011 jengelh@medozas.de - Remove redundant/unwanted tags/section (cf. specfile guidelines)
/usr/include/adns.h /usr/lib64/libadns.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 18:25:27 2024