bind: Update to 9.10.3-P4
Message ID | 1459331797-1156-1-git-send-email-matthias.fischer@ipfire.org |
---|---|
State | Accepted |
Commit | 8aa205f5fe97a9b94f9d9f478fa62c4fc584b59f |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (hedwig.ipfire.org [172.28.1.200]) by web02.ipfire.org (Postfix) with ESMTP id BBC1161A6E for <patchwork@ipfire.org>; Wed, 30 Mar 2016 11:56:46 +0200 (CEST) Received: from mail01.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id AF2FCC47; Wed, 30 Mar 2016 11:56:45 +0200 (CEST) Received: from Devel.localdomain (p57905D92.dip0.t-ipconnect.de [87.144.93.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 7485CC09 for <development@lists.ipfire.org>; Wed, 30 Mar 2016 11:56:42 +0200 (CEST) From: Matthias Fischer <matthias.fischer@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] bind: Update to 9.10.3-P4 Date: Wed, 30 Mar 2016 11:56:37 +0200 Message-Id: <1459331797-1156-1-git-send-email-matthias.fischer@ipfire.org> X-Mailer: git-send-email 2.8.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <http://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <http://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Message
Matthias Fischer
March 30, 2016, 8:56 p.m. UTC
Changelog (excerpt):
[security] Duplicate EDNS COOKIE options in a response could
trigger an assertion failure. (CVE-2016-2088) [RT #41809]
[security] Fix resolver assertion failure due to improper
DNAME handling when parsing fetch reply messages.
(CVE-2016-1286) [RT #41753]
[security] Malformed control messages can trigger assertions
in named and rndc. (CVE-2016-1285) [RT #41666]
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
---
lfs/bind | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)