File _patchinfo of Package patchinfo

<patchinfo incident="95">
  <packager>lmuelle</packager>
  <issue tracker="cve" id="CVE-2011-1907">ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.</issue>
  <issue tracker="cve" id="CVE-2012-3868"></issue>
  <issue tracker="cve" id="CVE-2012-5688"></issue>
  <issue tracker="cve" id="CVE-2013-2266"></issue>
  <issue tracker="bnc" id="710430">DNS problem with LDAP server</issue>
  <issue tracker="bnc" id="715881">named (BIND) does not start - openssl files missing in chroot</issue>
  <issue tracker="bnc" id="716745">yast2 failed to get DNS server up</issue>
  <issue tracker="bnc" id="718441">problem with rcnamed restart</issue>
  <issue tracker="bnc" id="738156">bind fails to start if switched to non chroot setup</issue>
  <issue tracker="bnc" id="743758">Creating SPF records with YaST DNS module doesnt work</issue>
  <issue tracker="bnc" id="772946">VUL-0: CVE-2012-3868: bind9: high tcp query load can trigger a memory leak</issue>
  <issue tracker="bnc" id="792926">VUL-0: CVE-2012-5688: bind: servers using DNS64 can be crashed by a crafted query</issue>
  <issue tracker="bnc" id="811876">VUL-0:  CVE-2013-2266: bind: 9.9.2-P2 security fix</issue>
  <category>security</category>
  <rating>moderate</rating>
  <summary>bind: update to 9.9.2-P2 security release</summary>
  <description>bind was updated to 9.9.2-P2, fixing a security issue in regular 
expression handling. [CVE-2013-2266] [RT #32688]
https://kb.isc.org/article/AA-00871 (bnc#811876)</description>
</patchinfo>