bind: Update to 9.10.3-P2
Message ID | 1451172013-18852-1-git-send-email-matthias.fischer@ipfire.org |
---|---|
State | Accepted |
Commit | 9977da131b2d2e560057b79db714a987977026b4 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.tremer.info [172.28.1.200]) by septima.ipfire.org (Postfix) with ESMTP id 6BE7961A6E for <patchwork@ipfire.org>; Sun, 27 Dec 2015 00:20:19 +0100 (CET) Received: from hedwig.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 42066568B; Sun, 27 Dec 2015 00:20:18 +0100 (CET) Received: from Devel.localdomain (p5DD836D9.dip0.t-ipconnect.de [93.216.54.217]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 2F5CD54CE for <development@lists.ipfire.org>; Sun, 27 Dec 2015 00:20:17 +0100 (CET) From: Matthias Fischer <matthias.fischer@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] bind: Update to 9.10.3-P2 Date: Sun, 27 Dec 2015 00:20:13 +0100 Message-Id: <1451172013-18852-1-git-send-email-matthias.fischer@ipfire.org> X-Mailer: git-send-email 2.6.4 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <http://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <http://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Message
Matthias Fischer
Dec. 27, 2015, 10:20 a.m. UTC
Changelog:
[security]
Update allowed OpenSSL versions as named is potentially
vulnerable to CVE-2015-3193.
[maint]
H.ROOT-SERVERS.NET is 198.97.190.53 and 2001:500:1::53. [RT #40556]
[security]
Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted,
triggering a REQUIRE failure when those records
were subsequently cached. (CVE-2015-8000) [RT #40987]
[security]
Address fetch context reference count handling error
on socket error. (CVE-2015-8461) [RT#40945]
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
---
lfs/bind | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Comments
Merged. On Sun, 2015-12-27 at 00:20 +0100, Matthias Fischer wrote: > Changelog: > > [security] > Update allowed OpenSSL versions as named is potentially > vulnerable to CVE-2015-3193. > > [maint] > H.ROOT-SERVERS.NET is 198.97.190.53 and 2001:500:1::53. [RT #40556] > > [security] > Insufficient testing when parsing a message allowed > records with an incorrect class to be be accepted, > triggering a REQUIRE failure when those records > were subsequently cached. (CVE-2015-8000) [RT #40987] > > [security] > Address fetch context reference count handling error > on socket error. (CVE-2015-8461) [RT#40945] > > Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org> > --- > lfs/bind | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/lfs/bind b/lfs/bind > index 6480798..b0d5185 100644 > --- a/lfs/bind > +++ b/lfs/bind > @@ -25,7 +25,7 @@ > > include Config > > -VER = 9.10.3 > +VER = 9.10.3-P2 > > THISAPP = bind-$(VER) > DL_FILE = $(THISAPP).tar.gz > @@ -43,7 +43,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_MD5 = d8cbf04a62a139a841d4bf878087a555 > +$(DL_FILE)_MD5 = 672dd3c2796b12ac8440f55bcaecfa82 > > install : $(TARGET) >