diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2021-04-29 01:37:15 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2021-04-29 09:00:04 +0200 |
commit | 3c2034f8a207f61aa2ea7c0a48adad6919a64643 (patch) | |
tree | 6030976b791612cd12fe048f8c74c121cf307ace /source/d | |
parent | abdca401c7c45e652987c030a41f12408b916eee (diff) | |
download | current-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.gz current-3c2034f8a207f61aa2ea7c0a48adad6919a64643.tar.xz |
Thu Apr 29 01:37:15 UTC 202120210429013715
n/bind-9.16.15-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issues:
A specially crafted GSS-TSIG query could cause a buffer overflow in the
ISC implementation of SPNEGO.
named crashed when a DNAME record placed in the ANSWER section during DNAME
chasing turned out to be the final answer to a client query.
Insufficient IXFR checks could result in named serving a zone without an SOA
record at the apex, leading to a RUNTIME_CHECK assertion failure when the
zone was subsequently refreshed. This has been fixed by adding an owner name
check for all SOA records which are included in a zone transfer.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214
(* Security fix *)
Diffstat (limited to 'source/d')
-rwxr-xr-x | source/d/guile/guile.SlackBuild | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source/d/guile/guile.SlackBuild b/source/d/guile/guile.SlackBuild index 75ff59947..56767bf69 100755 --- a/source/d/guile/guile.SlackBuild +++ b/source/d/guile/guile.SlackBuild @@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=guile VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-3} +BUILD=${BUILD:-1} # Automatically determine the architecture we're building on: if [ -z "$ARCH" ]; then |