Date: Wed, 16 Nov 2011 23:41:13 +0000 (UTC) From: Doug Barton <dougb@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/dns/bind96 Makefile distinfo ports/dns/bind97 Makefile distinfo ports/dns/bind98 Makefile distinfo Message-ID: <201111162341.pAGNfDHS010992@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
dougb 2011-11-16 23:41:13 UTC FreeBSD ports repository Modified files: dns/bind96 Makefile distinfo dns/bind97 Makefile distinfo dns/bind98 Makefile distinfo Log: Upgrade to the latest security patch releases to address the following DDOS bug: Recursive name servers are failing with an assertion: INSIST(! dns_rdataset_isassociated(sigrdataset)) At this time it is not thought that authoritative-only servers are affected, but information about this bug is evolving rapidly. Because it may be possible to trigger this bug even on networks that do not allow untrusted users to access the recursive name servers (perhaps via specially crafted e-mail messages, and/or malicious web sites) it is recommended that ALL operators of recursive name servers upgrade immediately. For more information see: https://www.isc.org/software/bind/advisories/cve-2011-tbd which will be updated as more information becomes available. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313 Feature safe: yes Revision Changes Path 1.119 +2 -2 ports/dns/bind96/Makefile 1.70 +4 -4 ports/dns/bind96/distinfo 1.22 +2 -2 ports/dns/bind97/Makefile 1.16 +4 -4 ports/dns/bind97/distinfo 1.12 +2 -2 ports/dns/bind98/Makefile 1.9 +4 -4 ports/dns/bind98/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201111162341.pAGNfDHS010992>