a3263f6a34
to root server addresses, and a fix for the vulnerability mentioned here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122 Users of BIND 9.3.x are strongly encouraged to upgrade to this version. Also, the 9.3.x branch is now in maintenance-only mode. Users are encouraged to investigate BIND 9.4.x or perhaps 9.5.x. http://www.isc.org/index.pl?/sw/bind/versions_and_support.php
6 lines
384 B
Text
6 lines
384 B
Text
MD5 (bind-9.3.5.tar.gz) = e5b82f5284679c68b761ac41b6d6066c
|
|
SHA256 (bind-9.3.5.tar.gz) = 5e9e1cc50fe3924e747dd15257ce73d06dc2c889ef26a5d60da837f424916f61
|
|
SIZE (bind-9.3.5.tar.gz) = 5730181
|
|
MD5 (bind-9.3.5.tar.gz.asc) = 671bb7d690dfe4e37a727eb9f6d77de9
|
|
SHA256 (bind-9.3.5.tar.gz.asc) = 0bf3399253e8008ee0018ba8459e3d5f0041acdf6944b0bfb5567b4d37562afa
|
|
SIZE (bind-9.3.5.tar.gz.asc) = 486
|