1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-20 08:27:15 +00:00
freebsd-ports/dns/bind96/distinfo
Doug Barton f62fd077b1 Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerability:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
2011-07-05 21:18:24 +00:00

5 lines
294 B
Plaintext

SHA256 (bind-9.6-ESV-R4-P3.tar.gz) = aeb8b3cba0afc851f90599cfe65f0e8360ecb4afdee47281c592cf16b605a2a6
SIZE (bind-9.6-ESV-R4-P3.tar.gz) = 7160255
SHA256 (bind-9.6-ESV-R4-P3.tar.gz.asc) = 68f4c87ff857f8363888365b56181f0d5e3dffc2cf7827032064f165ae8b4a17
SIZE (bind-9.6-ESV-R4-P3.tar.gz.asc) = 481