From owner-cvs-all@FreeBSD.ORG Wed Nov 16 23:41:13 2011 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id F152E1065675; Wed, 16 Nov 2011 23:41:13 +0000 (UTC) (envelope-from dougb@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id C81478FC13; Wed, 16 Nov 2011 23:41:13 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.4/8.14.4) with ESMTP id pAGNfDsh010993; Wed, 16 Nov 2011 23:41:13 GMT (envelope-from dougb@repoman.freebsd.org) Received: (from dougb@localhost) by repoman.freebsd.org (8.14.4/8.14.4/Submit) id pAGNfDHS010992; Wed, 16 Nov 2011 23:41:13 GMT (envelope-from dougb) Message-Id: <201111162341.pAGNfDHS010992@repoman.freebsd.org> From: Doug Barton Date: Wed, 16 Nov 2011 23:41:13 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/dns/bind96 Makefile distinfo ports/dns/bind97 Makefile distinfo ports/dns/bind98 Makefile distinfo X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Nov 2011 23:41:14 -0000 dougb 2011-11-16 23:41:13 UTC FreeBSD ports repository Modified files: dns/bind96 Makefile distinfo dns/bind97 Makefile distinfo dns/bind98 Makefile distinfo Log: Upgrade to the latest security patch releases to address the following DDOS bug: Recursive name servers are failing with an assertion: INSIST(! dns_rdataset_isassociated(sigrdataset)) At this time it is not thought that authoritative-only servers are affected, but information about this bug is evolving rapidly. Because it may be possible to trigger this bug even on networks that do not allow untrusted users to access the recursive name servers (perhaps via specially crafted e-mail messages, and/or malicious web sites) it is recommended that ALL operators of recursive name servers upgrade immediately. For more information see: https://www.isc.org/software/bind/advisories/cve-2011-tbd which will be updated as more information becomes available. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313 Feature safe: yes Revision Changes Path 1.119 +2 -2 ports/dns/bind96/Makefile 1.70 +4 -4 ports/dns/bind96/distinfo 1.22 +2 -2 ports/dns/bind97/Makefile 1.16 +4 -4 ports/dns/bind97/distinfo 1.12 +2 -2 ports/dns/bind98/Makefile 1.9 +4 -4 ports/dns/bind98/distinfo