From: Bob Halley Date: Fri, 9 Feb 2024 21:45:58 +0000 (-0800) Subject: 2.6.0 prep X-Git-Tag: v2.7.0rc1~95 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=27de2989996af2adfbc90cef229c6f8ceb5a094a;p=thirdparty%2Fdnspython.git 2.6.0 prep --- diff --git a/.github/workflows/python-package.yml b/.github/workflows/python-package.yml index 0a0670ad..70be4158 100644 --- a/.github/workflows/python-package.yml +++ b/.github/workflows/python-package.yml @@ -7,6 +7,7 @@ on: push: branches: - master + - 2.6 paths: - '**.py' pull_request: diff --git a/README.md b/README.md index 3a942955..6e44880e 100644 --- a/README.md +++ b/README.md @@ -30,7 +30,7 @@ to facilitate the testing of DNS software. ## ABOUT THIS RELEASE -This is the development version of dnspython 2.6.0. +This is the development version of dnspython 2.7.0. Please read [What's New](https://dnspython.readthedocs.io/en/latest/whatsnew.html) for information about the changes in this release. diff --git a/dns/version.py b/dns/version.py index 658cca28..7d3afb59 100644 --- a/dns/version.py +++ b/dns/version.py @@ -20,7 +20,7 @@ #: MAJOR MAJOR = 2 #: MINOR -MINOR = 6 +MINOR = 7 #: MICRO MICRO = 0 #: RELEASELEVEL diff --git a/doc/conf.py b/doc/conf.py index d62f8853..35b410b3 100644 --- a/doc/conf.py +++ b/doc/conf.py @@ -61,9 +61,9 @@ author = "Dnspython Contributors" # built documents. # # The short X.Y version. -version = "2.6" +version = "2.7" # The full version, including alpha/beta/rc tags. -release = "2.6.0" +release = "2.7.0" # The language for content autogenerated by Sphinx. Refer to documentation # for a list of supported languages. diff --git a/doc/whatsnew.rst b/doc/whatsnew.rst index 23a29e43..e588d5ce 100644 --- a/doc/whatsnew.rst +++ b/doc/whatsnew.rst @@ -3,9 +3,14 @@ What's New in dnspython ======================= -2.6.0 (in development) +2.7.0 (in development) ---------------------- +* TBD + +2.6.0 +----- + * As mentioned in the "TuDoor" paper and the associated CVE-2023-29483, the dnspython stub resolver is vulnerable to a potential DoS if a bad-in-some-way response from the right address and port forged by an attacker arrives before a legitimate one on the