Next | Query returned 2 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2016-03-11 10:38:01 by Benny Siegert | Files touched by this commit (2)
Log message:
Pullup ticket #4949 - requested by taca
net/bind910: security fix

Revisions pulled up:
- net/bind910/Makefile                                          1.18
- net/bind910/distinfo                                          1.15

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Thu Mar 10 00:48:41 UTC 2016

   Modified Files:
   	pkgsrc/net/bind910: Makefile distinfo

   Log message:
   Update bind910 to 9.10.3pl4 (BIND 9.10.3-P4), security release.

   	--- 9.10.3-P4 released ---

   4322.	[security]	Duplicate EDNS COOKIE options in a response could
   			trigger an assertion failure. (CVE-2016-2088)
   			[RT #41809]

   4319.	[security]	Fix resolver assertion failure due to improper
   			DNAME handling when parsing fetch reply messages.
   			(CVE-2016-1286) [RT #41753]

   4318.	[security]	Malformed control messages can trigger assertions
   			in named and rndc. (CVE-2016-1285) [RT #41666]
   2016-01-20 20:32:01 by Benny Siegert | Files touched by this commit (2)
Log message:
Pullup ticket #4901 - requested by taca
net/bind910: security fix

Revisions pulled up:
- net/bind910/Makefile                                          1.15
- net/bind910/distinfo                                          1.14

---
   Module Name:    pkgsrc
   Committed By:   taca
   Date:           Wed Jan 20 02:15:58 UTC 2016

   Modified Files:
           pkgsrc/net/bind910: Makefile distinfo

   Log message:
   Update bind910 to 9.10.3pl3 (BIND 9.10.3-P3).

   Security Fixes

        * Specific APL data could trigger an INSIST. This flaw was discovered
          by Brian Mitchell and is disclosed in CVE-2015-8704. [RT #41396]
        * Certain errors that could be encountered when printing out or
          logging an OPT record containing a CLIENT-SUBNET option could be
          mishandled, resulting in an assertion failure. This flaw was
          discovered by Brian Mitchell and is disclosed in CVE-2015-8705. [RT
          #41397]
        * Named is potentially vulnerable to the OpenSSL vulnerabilty
          described in CVE-2015-3193.
        * Insufficient testing when parsing a message allowed records with an
          incorrect class to be be accepted, triggering a REQUIRE failure
          when those records were subsequently cached. This flaw is disclosed
          in CVE-2015-8000. [RT #40987]
        * Incorrect reference counting could result in an INSIST failure if a
          socket error occurred while performing a lookup. This flaw is
          disclosed in CVE-2015-8461. [RT#40945]

   New Features

        * None.

   Feature Changes

        * Updated the compiled in addresses for H.ROOT-SERVERS.NET.

   Bug Fixes

        * Authoritative servers that were marked as bogus (e.g. blackholed in
          configuration or with invalid addresses) were being queried anyway.
          [RT #41321]

Next | Query returned 2 messages, browsing 1 to 10 | previous