Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Jul 2009 00:22:52 +0000 (UTC)
From:      Doug Barton <dougb@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/dns/bind9 Makefile ports/dns/bind9/files patch-bin_named_update.c
Message-ID:  <200907290022.n6T0MqF9060133@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
dougb       2009-07-29 00:22:52 UTC

  FreeBSD ports repository

  Modified files:
    dns/bind9            Makefile 
  Added files:
    dns/bind9/files      patch-bin_named_update.c 
  Log:
  Apply the patch derived from version 9.6.1-P1 which addresses a remote
  DoS vulnerability:
  
          Receipt of a specially-crafted dynamic update message may
          cause BIND 9 servers to exit. This vulnerability affects all
          servers -- it is not limited to those that are configured to
          allow dynamic updates. Access controls will not provide an
          effective workaround.
  
  More details can be found here: https://www.isc.org/node/474
  
  All BIND users are encouraged to update to a patched version ASAP.
  
  Revision  Changes    Path
  1.90      +1 -1      ports/dns/bind9/Makefile
  1.1       +16 -0     ports/dns/bind9/files/patch-bin_named_update.c (new)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200907290022.n6T0MqF9060133>