1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-22 08:58:47 +00:00
freebsd-ports/dns/bind97/distinfo
Doug Barton 59eefda0a9 Upgrade to the latest security patch releases to address the
following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Feature safe:	yes
2011-11-16 23:41:13 +00:00

5 lines
274 B
Plaintext

SHA256 (bind-9.7.4-P1.tar.gz) = e23ca1af22424d512094da2a175d8f9500e8b0b10cbd332714d211ea1abdd55d
SIZE (bind-9.7.4-P1.tar.gz) = 8317704
SHA256 (bind-9.7.4-P1.tar.gz.asc) = d8340759f6ef0c74e256b05842bb12d4b163c8e081ed6f227cce947aa15f58cd
SIZE (bind-9.7.4-P1.tar.gz.asc) = 481