summaryrefslogtreecommitdiff
path: root/usr.sbin/nsd/configure.ac
diff options
context:
space:
mode:
authorFlorian Obser <florian@cvs.openbsd.org>2018-07-30 08:57:10 +0000
committerFlorian Obser <florian@cvs.openbsd.org>2018-07-30 08:57:10 +0000
commit3c48a669ba3c699af7932166957bcb9d94a856ab (patch)
tree7b7a4a7c07699407ab04522b8e42ae5b8cbb1e50 /usr.sbin/nsd/configure.ac
parent6fbe30acc82bffc8debe60db23b16bd4b2d9ddaa (diff)
update to nsd 4.1.23, from the release notes:
------------------------------------------------------------------------ NSD versions 4.1.22 and before are vulnerable in comparing TSIG information and this can be used to discover a TSIG secret. NSD uses TSIG to protect zone transfers. The TSIG code uses a secret key to protect the data. The secret key is shared with both sides of the zone transfer connection. The comparison code in NSD was not time insensitive, causing the potential for an attacker to use timing information to discover data about the key contents. NSD versions from 2.2.0 to 4.1.22 are vulnerable. Upgrade to 4.1.23 or newer to get the fix. It was reported by Ondrej Sury (ISC). ------------------------------------------------------------------------ OK tb, sthen
Diffstat (limited to 'usr.sbin/nsd/configure.ac')
-rw-r--r--usr.sbin/nsd/configure.ac2
1 files changed, 1 insertions, 1 deletions
diff --git a/usr.sbin/nsd/configure.ac b/usr.sbin/nsd/configure.ac
index 4c6772a47bd..c17501cb5a0 100644
--- a/usr.sbin/nsd/configure.ac
+++ b/usr.sbin/nsd/configure.ac
@@ -4,7 +4,7 @@ dnl
sinclude(acx_nlnetlabs.m4)
-AC_INIT(NSD,4.1.22,nsd-bugs@nlnetlabs.nl)
+AC_INIT(NSD,4.1.23,nsd-bugs@nlnetlabs.nl)
AC_CONFIG_HEADER([config.h])
CFLAGS="$CFLAGS"