Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 4 Nov 2006 07:53:27 +0000 (UTC)
From:      Doug Barton <dougb@FreeBSD.org>
To:        src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/contrib/bind9 - Imported sources
Message-ID:  <200611040753.kA47rReN028118@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
dougb       2006-11-04 07:53:26 UTC

  FreeBSD src repository

  src/contrib/bind9 - Imported sources
  Update of /home/ncvs/src/contrib/bind9
  In directory repoman.freebsd.org:/tmp/cvs-serv28030
  
  Log Message:
  Update to version 9.3.2-P2, which addresses the vulnerability
  announced by ISC dated 31 October (delivered via e-mail to the
  bind-announce@isc.org list on 2 November):
  
  Description:
          Because of OpenSSL's recently announced vulnerabilities
          (CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named,
          we are announcing this workaround and releasing patches.  A proof of
          concept attack on OpenSSL has been demonstrated for CAN-2006-4339.
  
          OpenSSL is required to use DNSSEC with BIND.
  
  Fix for version 9.3.2-P1 and lower:
          Upgrade to BIND 9.3.2-P2, then generate new RSASHA1 and
          RSAMD5 keys for all old keys using the old default exponent
          and perform a key rollover to these new keys.
  
          These versions also change the default RSA exponent to be
          65537 which is not vulnerable to the attacks described in
          CAN-2006-4339.
  
  Status:
  
  Vendor Tag:	ISC
  Release Tags:	BIND_9_3_2_P2
  		
  U src/contrib/bind9/version
  U src/contrib/bind9/configure.in
  U src/contrib/bind9/CHANGES
  U src/contrib/bind9/bin/named/query.c
  U src/contrib/bind9/lib/dns/resolver.c
  U src/contrib/bind9/lib/dns/opensslrsa_link.c
  
  No conflicts created by this import
  



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200611040753.kA47rReN028118>