Bug 1981324
| Summary: | opendnssec-2.1.10 is available | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | François Cami <fcami> |
| Component: | opendnssec | Assignee: | Rafael Jeffman <rjeffman> |
| Status: | CLOSED ERRATA | QA Contact: | Michal Polovka <mpolovka> |
| Severity: | unspecified | Docs Contact: | Filip Hanzelka <fhanzelk> |
| Priority: | unspecified | ||
| Version: | 9.0 | CC: | abokovoy, amore, antorres, extras-qa, fcami, frenaud, ftrivino, gfialova, paul.wouters, sumenon, upstream-release-monitoring |
| Target Milestone: | beta | Keywords: | FutureFeature, Rebase, Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | opendnssec-2.1.10-1.el9 | Doc Type: | Enhancement |
| Doc Text: |
Important: if this rebase instead contains *only bug fixes,* or *only enhancements*, select the correct option from the Doc Type drop-down list.
Rebase package(s) to version: 2.1.10
Highlights, important fixes, or notable enhancements: see https://www.opendnssec.org/2021/09/opendnssec-2-1-10/
|
Story Points: | --- |
| Clone Of: | 1981318 | Environment: | |
| Last Closed: | 2023-11-07 08:33:34 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1956561, 1981318, 2020204 | ||
| Bug Blocks: | |||
|
Description
François Cami
2021-07-12 11:56:53 UTC
Moving to target 2.1.10. Upstream (Fedora) bug: https://bugzilla.redhat.com/show_bug.cgi?id=2003250 Changelog: https://www.opendnssec.org/ OPENDNSSEC-955: Prevent concurrency between certain valid PKCS#11 HSM operations to avoid some keys to be (transiently) unavailable. OPENDNSSEC-956: Harden signing procedure to still sign zones for which there are unused keys specified in the zone which are unavailable. OPENDNSSEC-957: Fix exit code signer daemon to not always report failure. OPENDNSSEC-958: Fix immediate resalting after migration from 1.4. OPENDNSSEC-959: Emit warning on ods-kaspcheck for NSEC iteration count that is deemed too high. SUPPORT-265: Resolve conflict when deleting keys from HSM whilst also performing step in key roll process. Typically a message “key_data_update failed” is present in logs. Of these: - OPENDNSSEC-955 - SUPPORT-265 are stability enhancers while: - OPENDNSSEC-957 makes testing easier. https://bugzilla.redhat.com/show_bug.cgi?id=2003250 is closed as that version is now built in rawhide. Moving ITM as the build is not yet available. Verified manually using RHEL9.3 with the test compose enabled. # rpm -q opendnssec opendnssec-2.1.10-1.el9.x86_64 # rpm -q --changelog opendnssec * Thu Apr 27 2023 Rafael Guterres Jeffman <rjeffman> - 2.1.10-1 - Upstream release 2.1.10. Resolves: rhbz#1981324 * Mon Aug 09 2021 Mohan Boddu <mboddu> - 2.1.8-4 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Wed Jun 16 2021 Mohan Boddu <mboddu> - 2.1.8-3 - Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065 Therefore marking as preverified: tested. No automation required. Verified manually using RHEL9.3 with the nightly build present. # rpm -q opendnssec opendnssec-2.1.10-1.el9.x86_64 # rpm -q --changelog opendnssec * Thu Apr 27 2023 Rafael Guterres Jeffman <rjeffman> - 2.1.10-1 - Upstream release 2.1.10. Resolves: rhbz#1981324 * Mon Aug 09 2021 Mohan Boddu <mboddu> - 2.1.8-4 - Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Related: rhbz#1991688 * Wed Jun 16 2021 Mohan Boddu <mboddu> - 2.1.8-3 - Rebuilt for RHEL 9 BETA for openssl 3.0 Related: rhbz#1971065 Therefore marking as Verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (opendnssec bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:6458 |