Date: Tue, 5 Jul 2011 21:18:24 +0000 (UTC) From: Doug Barton <dougb@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/dns/bind96 Makefile distinfo ports/dns/bind97 Makefile distinfo Message-ID: <201107052118.p65LIOrq016434@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
dougb 2011-07-05 21:18:24 UTC
FreeBSD ports repository
Modified files:
dns/bind96 Makefile distinfo
dns/bind97 Makefile distinfo
Log:
Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY
This update addresses the following vulnerability:
CVE-2011-2464
=============
Severity: High
Exploitable: Remotely
Description:
A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
Revision Changes Path
1.116 +2 -2 ports/dns/bind96/Makefile
1.68 +4 -4 ports/dns/bind96/distinfo
1.18 +2 -2 ports/dns/bind97/Makefile
1.14 +4 -4 ports/dns/bind97/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201107052118.p65LIOrq016434>
