Now
MAIN commitmail json YAML
pkgsrc/net/bind910/Makefile@1.12
/
diff
pkgsrc/net/bind910/distinfo@1.10 / diff
pkgsrc/net/bind910/patches/patch-lib_dns_hmac_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_include_dst_dst.h deleted
pkgsrc/net/bind910/patches/patch-lib_dns_ncache.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_openssldh_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_openssldsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_opensslecdsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_opensslrsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11dh_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11dsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11rsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_rdata_generic_openpgpkey_61.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_resolver.c deleted
pkgsrc/net/bind910/distinfo@1.10 / diff
pkgsrc/net/bind910/patches/patch-lib_dns_hmac_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_include_dst_dst.h deleted
pkgsrc/net/bind910/patches/patch-lib_dns_ncache.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_openssldh_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_openssldsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_opensslecdsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_opensslrsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11dh_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11dsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_pkcs11rsa_link.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_rdata_generic_openpgpkey_61.c deleted
pkgsrc/net/bind910/patches/patch-lib_dns_resolver.c deleted
Update bind910 to 9.10.2pl4 (BIND 9.10.2-P4).
(Already fixed by bind-9.10.2pl3nb1.)
--- 9.10.2-P4 released ---
4170. [security] An incorrect boundary check in the OPENPGPKEY
rdatatype could trigger an assertion failure.
(CVE-2015-5986) [RT #40286]
4168. [security] A buffer accounting error could trigger an
assertion failure when parsing certain malformed
DNSSEC keys. (CVE-2015-5722) [RT #40212]
(Already fixed by bind-9.10.2pl3nb1.)
--- 9.10.2-P4 released ---
4170. [security] An incorrect boundary check in the OPENPGPKEY
rdatatype could trigger an assertion failure.
(CVE-2015-5986) [RT #40286]
4168. [security] A buffer accounting error could trigger an
assertion failure when parsing certain malformed
DNSSEC keys. (CVE-2015-5722) [RT #40212]