freebsd-ports/dns/bind98/distinfo
Doug Barton 59eefda0a9 Upgrade to the latest security patch releases to address the
following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Feature safe:	yes
2011-11-16 23:41:13 +00:00

4 lines
274 B
Text

SHA256 (bind-9.8.1-P1.tar.gz) = 867fdd52d3436c6ab6d357108d7f9eaaf03f1422652e6e61c742816ff7f87929
SIZE (bind-9.8.1-P1.tar.gz) = 8451969
SHA256 (bind-9.8.1-P1.tar.gz.asc) = 661e33e104a7750a6468f1314fc6020876241cba4efb10cb304ddefbec1ef4ab
SIZE (bind-9.8.1-P1.tar.gz.asc) = 481