From owner-cvs-src@FreeBSD.ORG Sat Nov 4 07:53:31 2006 Return-Path: X-Original-To: cvs-src@FreeBSD.org Delivered-To: cvs-src@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 784C516A415; Sat, 4 Nov 2006 07:53:31 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 40B9143D7F; Sat, 4 Nov 2006 07:53:27 +0000 (GMT) (envelope-from dougb@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id kA47rRCB028119; Sat, 4 Nov 2006 07:53:27 GMT (envelope-from dougb@repoman.freebsd.org) Received: (from dougb@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id kA47rReN028118; Sat, 4 Nov 2006 07:53:27 GMT (envelope-from dougb) Message-Id: <200611040753.kA47rReN028118@repoman.freebsd.org> From: Doug Barton Date: Sat, 4 Nov 2006 07:53:27 +0000 (UTC) To: src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: ISC Cc: Subject: cvs commit: src/contrib/bind9 - Imported sources X-BeenThere: cvs-src@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Nov 2006 07:53:31 -0000 dougb 2006-11-04 07:53:26 UTC FreeBSD src repository src/contrib/bind9 - Imported sources Update of /home/ncvs/src/contrib/bind9 In directory repoman.freebsd.org:/tmp/cvs-serv28030 Log Message: Update to version 9.3.2-P2, which addresses the vulnerability announced by ISC dated 31 October (delivered via e-mail to the bind-announce@isc.org list on 2 November): Description: Because of OpenSSL's recently announced vulnerabilities (CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named, we are announcing this workaround and releasing patches. A proof of concept attack on OpenSSL has been demonstrated for CAN-2006-4339. OpenSSL is required to use DNSSEC with BIND. Fix for version 9.3.2-P1 and lower: Upgrade to BIND 9.3.2-P2, then generate new RSASHA1 and RSAMD5 keys for all old keys using the old default exponent and perform a key rollover to these new keys. These versions also change the default RSA exponent to be 65537 which is not vulnerable to the attacks described in CAN-2006-4339. Status: Vendor Tag: ISC Release Tags: BIND_9_3_2_P2 U src/contrib/bind9/version U src/contrib/bind9/configure.in U src/contrib/bind9/CHANGES U src/contrib/bind9/bin/named/query.c U src/contrib/bind9/lib/dns/resolver.c U src/contrib/bind9/lib/dns/opensslrsa_link.c No conflicts created by this import