Date: Tue, 5 Jul 2011 21:18:24 +0000 (UTC) From: Doug Barton <dougb@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/dns/bind96 Makefile distinfo ports/dns/bind97 Makefile distinfo Message-ID: <201107052118.p65LIOrq016434@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
dougb 2011-07-05 21:18:24 UTC FreeBSD ports repository Modified files: dns/bind96 Makefile distinfo dns/bind97 Makefile distinfo Log: Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3. ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerability: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464 Revision Changes Path 1.116 +2 -2 ports/dns/bind96/Makefile 1.68 +4 -4 ports/dns/bind96/distinfo 1.18 +2 -2 ports/dns/bind97/Makefile 1.14 +4 -4 ports/dns/bind97/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201107052118.p65LIOrq016434>