summaryrefslogtreecommitdiffstats
path: root/kernels/VERSIONS.TXT
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2021-04-29 01:37:15 +0000
committer Eric Hameleers <alien@slackware.com>2021-04-29 09:00:04 +0200
commit3c2034f8a207f61aa2ea7c0a48adad6919a64643 (patch)
tree6030976b791612cd12fe048f8c74c121cf307ace /kernels/VERSIONS.TXT
parentabdca401c7c45e652987c030a41f12408b916eee (diff)
downloadcurrent-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.gz
current-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.xz
Thu Apr 29 01:37:15 UTC 202120210429013715
n/bind-9.16.15-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: A specially crafted GSS-TSIG query could cause a buffer overflow in the ISC implementation of SPNEGO. named crashed when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query. Insufficient IXFR checks could result in named serving a zone without an SOA record at the apex, leading to a RUNTIME_CHECK assertion failure when the zone was subsequently refreshed. This has been fixed by adding an owner name check for all SOA records which are included in a zone transfer. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214 (* Security fix *)
Diffstat (limited to 'kernels/VERSIONS.TXT')
-rw-r--r--kernels/VERSIONS.TXT2
1 files changed, 1 insertions, 1 deletions
diff --git a/kernels/VERSIONS.TXT b/kernels/VERSIONS.TXT
index 3c7b6acd8..86cce958b 100644
--- a/kernels/VERSIONS.TXT
+++ b/kernels/VERSIONS.TXT
@@ -1,3 +1,3 @@
-These kernels are version 5.10.32.
+These kernels are version 5.10.33.