Date: Tue, 24 Jul 2007 22:00:04 +0000 (UTC) From: Doug Barton <dougb@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/dns/bind9 Makefile distinfo Message-ID: <200707242200.l6OM042b003639@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
dougb 2007-07-24 22:00:04 UTC FreeBSD ports repository Modified files: dns/bind9 Makefile distinfo Log: Update to 9.3.4-P1, which fixes the following: The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926 Revision Changes Path 1.78 +2 -2 ports/dns/bind9/Makefile 1.42 +6 -6 ports/dns/bind9/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200707242200.l6OM042b003639>