bind: Update to 9.11.0-P1
Message ID | 20161216170651.21511-1-matthias.fischer@ipfire.org |
---|---|
State | Accepted |
Commit | dcc3b47f0070880bdfa3919a5246187e8cdbb307 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (unknown [172.28.1.200]) by web02.ipfire.org (Postfix) with ESMTP id 5676361EA3 for <patchwork@ipfire.org>; Fri, 16 Dec 2016 18:06:58 +0100 (CET) Received: from mail01.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id B985F3CD2; Fri, 16 Dec 2016 18:06:57 +0100 (CET) Received: from Devel.localdomain (p5DD82631.dip0.t-ipconnect.de [93.216.38.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 7E2123CCF for <development@lists.ipfire.org>; Fri, 16 Dec 2016 18:06:55 +0100 (CET) From: Matthias Fischer <matthias.fischer@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH] bind: Update to 9.11.0-P1 Date: Fri, 16 Dec 2016 18:06:51 +0100 Message-Id: <20161216170651.21511-1-matthias.fischer@ipfire.org> X-Mailer: git-send-email 2.11.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <http://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <http://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Message
Matthias Fischer
Dec. 17, 2016, 4:06 a.m. UTC
http://ftp.isc.org/isc/bind9/9.11.0-P1/RELEASE-NOTES-bind-9.11.0-P1.html:
"BIND 9.11.0-P1 addresses the security issue described in CVE-2016-8864"
https://access.redhat.com/security/cve/cve-2016-8864:
"A denial of service flaw was found in the way BIND handled responses
containing a DNAME answer. A remote attacker could use this flaw to
make named exit unexpectedly with an assertion failure via a specially
crafted DNS response."
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
---
lfs/bind | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)