pkgsrc/net/bind9/distinfo
adrianp d1991b97c2 Fixes for CVE-2006-4095 and CVE-2006-4096 from bind-9.3.2-P1
* Assertion failure in ISC BIND SIG query processing (CVE-2006-4095)

- Recursive servers
Queries for SIG records will trigger an assertion failure if more
than one RRset is returned. However exposure can be minimized by
restricting which sources can ask for recursion.

- Authoritative servers
If a nameserver is serving a RFC 2535 DNSSEC zone and is queried
for the SIG records where there are multiple RRsets, then the
named program will trigger an assertion failure when it tries
to construct the response.

* INSIST failure in ISC BIND recursive query handling code (CVE-2006-4096)

It is possible to trigger an INSIST failure by sending enough
recursive queries such that the response to the query arrives after
all the clients waiting for the response have left the recursion
queue. However exposure can be minimized by restricting which sources
can ask for recursion.
2006-09-05 20:45:32 +00:00

18 lines
1,006 B
Text

$NetBSD: distinfo,v 1.29 2006/09/05 20:45:32 adrianp Exp $
SHA1 (bind-9.3.2.tar.gz) = 13efeaf496ed110980088fb5cbe22460f04a0fac
RMD160 (bind-9.3.2.tar.gz) = c825b6308eb374e9bcf9b6ccc48f65d8753c0a6d
Size (bind-9.3.2.tar.gz) = 5302112 bytes
SHA1 (patch-ab) = dd12c457791a75a8b43d9dfd0c0b236dcdbe31a5
SHA1 (patch-ac) = 4df1ece91d59b2b36fc7a4316604f1c112cf70ba
SHA1 (patch-ad) = 0e28ae0bb42e633f1ff1111478c97ced5c222186
SHA1 (patch-af) = 61725e32bd2d3eb56bfc162ddfb172624e1cfc8e
SHA1 (patch-ag) = 9d61e0f527a76977bf8457355997d201fa37dd4e
SHA1 (patch-ai) = fbe3b15b2d49e6767c8cfe9d985924c2ad797b9f
SHA1 (patch-aj) = c3bbf84a8a735298552f918ac38331e06a1b68a1
SHA1 (patch-al) = eb6a52d3f865639447ec6f9019c0ea1d2122b772
SHA1 (patch-am) = bb267f13dbd30d492f4dfcf9c278b941efa97bed
SHA1 (patch-an) = b3e5cd93890aa9a9cec7c14abf1b62ddbf854b14
SHA1 (patch-ao) = 8a3f8f1b5871af263fc99bc8e552b3ab615bc815
SHA1 (patch-ap) = 817c39121f1b62f8033822a42d7d9f8a5b5372ea
SHA1 (patch-aq) = 20cde9869c69dff2aca4784ec9b8b032639776fe