News for package bind9

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.0
Source: bind9
Binary: bind9, bind9utils, bind9-doc, host, bind9-host, libbind-dev, libbind9-80, libdns88, libisc84, liblwres80, libisccc80, libisccfg82, dnsutils, lwresd
Architecture: any all
Version: 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
Maintainer: LaMont Jones <[email protected]>
Uploaders: Bdale Garbee <[email protected]>
Standards-Version: 3.7.3.0
Vcs-Browser: http://git.debian.org/?p=users/lamont/bind9.git
Vcs-Git: git://git.debian.org/~lamont/bind9.git
Build-Depends: libkrb5-dev, debhelper (>= 5), libssl-dev, libtool, bison, libdb-dev (>> 4.6), libldap2-dev, libxml2-dev, libcap2-dev [!kfreebsd-i386 !kfreebsd-amd64 !hurd-i386], hardening-wrapper, libgeoip-dev (>= 1.4.6.dfsg-5), dpkg-dev (>= 1.15.5)
Build-Conflicts: libdb4.2-dev
Package-List: 
 bind9 deb net optional
 bind9-doc deb doc optional
 bind9-host deb net standard
 bind9utils deb net optional
 dnsutils deb net standard
 host deb net standard
 libbind-dev deb libdevel optional
 libbind9-80 deb libs standard
 libdns88 deb libs standard
 libisc84 deb libs standard
 libisccc80 deb libs optional
 libisccfg82 deb libs optional
 liblwres80 deb libs standard
 lwresd deb net optional
Checksums-Sha1: 
 3ab83667ab3ce2df6bdf558cc1e5a361fe5b539b 7258441 bind9_9.8.4.dfsg.P1.orig.tar.gz
 520fe1365bd3182a884f99c41f7fcd9334f753c7 682423 bind9_9.8.4.dfsg.P1-6+nmu2+deb7u4.diff.gz
Checksums-Sha256: 
 de7b8ef3f5336ba2c19e7ad8cec618e1bf77fbd81cc2e45cc7f798544e843bdb 7258441 bind9_9.8.4.dfsg.P1.orig.tar.gz
 03f6146ec688abe0a2b6876e0d23130cc8171de8ead6ff971451455f1ce02d46 682423 bind9_9.8.4.dfsg.P1-6+nmu2+deb7u4.diff.gz
Files: 
 96f5c03a8b42d29519c8860bea5a8353 7258441 bind9_9.8.4.dfsg.P1.orig.tar.gz
 7363e418057de59045c460b948d30877 682423 bind9_9.8.4.dfsg.P1-6+nmu2+deb7u4.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=x3ws
-----END PGP SIGNATURE-----

Changes:
bind9 (1:9.8.4.dfsg.P1-6+nmu2+deb7u4) wheezy-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * CVE-2015-1349: avoid crash due to managed-key rollover.
    Revoking a managed trust anchor and supplying an untrusted replacement
    could cause named to crash with an assertion failure.

 -- Salvatore Bonaccorso <[email protected]>  Wed, 18 Feb 2015 08:25:15 +0100