summaryrefslogtreecommitdiffstats
path: root/extra/source/php8/fetch-php.sh
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2021-04-29 01:37:15 +0000
committer Eric Hameleers <alien@slackware.com>2021-04-29 09:00:04 +0200
commit3c2034f8a207f61aa2ea7c0a48adad6919a64643 (patch)
tree6030976b791612cd12fe048f8c74c121cf307ace /extra/source/php8/fetch-php.sh
parentabdca401c7c45e652987c030a41f12408b916eee (diff)
downloadcurrent-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.gz
current-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.xz
Thu Apr 29 01:37:15 UTC 202120210429013715
n/bind-9.16.15-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: A specially crafted GSS-TSIG query could cause a buffer overflow in the ISC implementation of SPNEGO. named crashed when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query. Insufficient IXFR checks could result in named serving a zone without an SOA record at the apex, leading to a RUNTIME_CHECK assertion failure when the zone was subsequently refreshed. This has been fixed by adding an owner name check for all SOA records which are included in a zone transfer. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214 (* Security fix *)
Diffstat (limited to 'extra/source/php8/fetch-php.sh')
0 files changed, 0 insertions, 0 deletions