From owner-cvs-src-old@FreeBSD.ORG Wed Jul 29 00:31:45 2009 Return-Path: Delivered-To: cvs-src-old@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 95ED7106566B for ; Wed, 29 Jul 2009 00:31:45 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 82A418FC19 for ; Wed, 29 Jul 2009 00:31:45 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id n6T0Vjpp060839 for ; Wed, 29 Jul 2009 00:31:45 GMT (envelope-from dougb@repoman.freebsd.org) Received: (from svn2cvs@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id n6T0Vj9r060838 for cvs-src-old@freebsd.org; Wed, 29 Jul 2009 00:31:45 GMT (envelope-from dougb@repoman.freebsd.org) Message-Id: <200907290031.n6T0Vj9r060838@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: svn2cvs set sender to dougb@repoman.freebsd.org using -f From: Doug Barton Date: Wed, 29 Jul 2009 00:15:39 +0000 (UTC) To: cvs-src-old@freebsd.org X-FreeBSD-CVS-Branch: HEAD Subject: cvs commit: src/contrib/bind9 CHANGES version src/contrib/bind9/bin/named update.c X-BeenThere: cvs-src-old@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jul 2009 00:31:45 -0000 dougb 2009-07-29 00:15:39 UTC FreeBSD src repository Modified files: contrib/bind9 CHANGES version contrib/bind9/bin/named update.c Log: SVN rev 195936 on 2009-07-29 00:15:39Z by dougb Update to version 9.6.1-P1 which addresses a remote DoS vulnerability: Receipt of a specially-crafted dynamic update message may cause BIND 9 servers to exit. This vulnerability affects all servers -- it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround. More details can be found here: https://www.isc.org/node/474 All BIND users are encouraged to update to a patched version ASAP. Approved by: re (re -> SO -> dougb) Revision Changes Path 1.9 +4 -0 src/contrib/bind9/CHANGES 1.4 +6 -2 src/contrib/bind9/bin/named/update.c 1.9 +3 -3 src/contrib/bind9/version