d7806e8522
--- 9.9.6-P1 released --- 4006. [security] A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500). The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. [RT #37580]
13 lines
856 B
Text
13 lines
856 B
Text
$NetBSD: distinfo,v 1.26 2014/12/08 21:58:18 taca Exp $
|
|
|
|
SHA1 (bind-9.9.6-P1.tar.gz) = c2c276dd1f205924662bd94242a8776ea29c4e3b
|
|
RMD160 (bind-9.9.6-P1.tar.gz) = faaeaadc9b1b6245665e98392e9fd0c44cf660fd
|
|
Size (bind-9.9.6-P1.tar.gz) = 7816337 bytes
|
|
SHA1 (patch-bin_dig_dighost.c) = 72cb7676cdf9cd4b44bc62c72bcf29127d9fbffe
|
|
SHA1 (patch-bin_tests_system_Makefile.in) = 483fca89658263f5c1f974ce1151721835355aa8
|
|
SHA1 (patch-config.threads.in) = 227b83efe9cb3e301aaac9b97cf42f1fb8ad06b2
|
|
SHA1 (patch-configure) = b55ed3e56b61df65f526079d6a14b65fdd3a5a43
|
|
SHA1 (patch-contrib_dlz_config.dlz.in) = f18bec63fbfce7cb2cd72929058ce3770fce458f
|
|
SHA1 (patch-lib_dns_rbt.c) = df4b029369d9fa3b250d8505b5f7590e2cd86654
|
|
SHA1 (patch-lib_lwres_getaddrinfo.c) = cda91b6d1afa02de2c59d51490090ef4ab7f1a41
|
|
SHA1 (patch-lib_lwres_getnameinfo.c) = 7ded70795a9001cce5c8094ef3f70ac787a6d43d
|