mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-20 08:27:15 +00:00
f62fd077b1
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerability: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464
5 lines
294 B
Plaintext
5 lines
294 B
Plaintext
SHA256 (bind-9.6-ESV-R4-P3.tar.gz) = aeb8b3cba0afc851f90599cfe65f0e8360ecb4afdee47281c592cf16b605a2a6
|
|
SIZE (bind-9.6-ESV-R4-P3.tar.gz) = 7160255
|
|
SHA256 (bind-9.6-ESV-R4-P3.tar.gz.asc) = 68f4c87ff857f8363888365b56181f0d5e3dffc2cf7827032064f165ae8b4a17
|
|
SIZE (bind-9.6-ESV-R4-P3.tar.gz.asc) = 481
|