Date: Fri, 3 Nov 2006 07:47:22 +0000 (UTC) From: Doug Barton <dougb@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/dns/bind9 Makefile distinfo Message-ID: <200611030747.kA37lMZ0018601@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
dougb 2006-11-03 07:47:22 UTC FreeBSD ports repository Modified files: dns/bind9 Makefile distinfo Log: Update to version 9.3.2-P2, which addresses the vulnerability announced by ISC dated 31 October (delivered via e-mail to the bind-announce@isc.org list today): Description: Because of OpenSSL's recently announced vulnerabilities (CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named, we are announcing this workaround and releasing patches. A proof of concept attack on OpenSSL has been demonstrated for CAN-2006-4339. OpenSSL is required to use DNSSEC with BIND. Fix for version 9.3.2-P1 and lower: Upgrade to BIND 9.2.3-P2, then generate new RSASHA1 and RSAMD5 keys for all old keys using the old default exponent and perform a key rollover to these new keys. These versions also change the default RSA exponent to be 65537 which is not vulnerable to the attacks described in CAN-2006-4339. Revision Changes Path 1.72 +2 -2 ports/dns/bind9/Makefile 1.39 +6 -6 ports/dns/bind9/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200611030747.kA37lMZ0018601>