BIND 9.5.2-P2 is a SECURITY PATCH for BIND 9.5.2. It addresses two potential cache poisoning vulnerabilities, both of which could allow a validating recursive nameserver to cache data which had not been authenticated or was invalid. CVE identifiers: CVE-2009-4022, CVE-2010-0097 CERT advisories: VU#418861, VU#360341 Changes since 9.5.2-P1: 2831. [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] 2828. [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] 2827. [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712]
16 lines
893 B
Text
16 lines
893 B
Text
$NetBSD: distinfo,v 1.12 2010/01/21 19:42:16 spz Exp $
|
|
|
|
SHA1 (bind-9.5.2-P2.tar.gz) = ffa6df6752976e6bdd05508c5cc5131ef9a097f1
|
|
RMD160 (bind-9.5.2-P2.tar.gz) = a0864dadb1af7268a0c54fed3bc178bd17abb55c
|
|
Size (bind-9.5.2-P2.tar.gz) = 6674868 bytes
|
|
SHA1 (patch-ab) = dd12c457791a75a8b43d9dfd0c0b236dcdbe31a5
|
|
SHA1 (patch-ac) = a2c24198044f8cf29198e08a1a10b7e4ea739c40
|
|
SHA1 (patch-ad) = 5c8af5a826e4f6891dfdf949b8a541ee33e16c3e
|
|
SHA1 (patch-af) = b21bb5195cdb4deec00e5abd39f5bf2137549c3f
|
|
SHA1 (patch-ag) = 9d61e0f527a76977bf8457355997d201fa37dd4e
|
|
SHA1 (patch-ai) = 15fb7b46d0c997a6abd60307f111848657a57412
|
|
SHA1 (patch-aj) = c3bbf84a8a735298552f918ac38331e06a1b68a1
|
|
SHA1 (patch-al) = eb6a52d3f865639447ec6f9019c0ea1d2122b772
|
|
SHA1 (patch-am) = bb267f13dbd30d492f4dfcf9c278b941efa97bed
|
|
SHA1 (patch-an) = be808fcb6f2f9b88c6a0d94765bda4b5eb8a4c93
|
|
SHA1 (patch-ao) = 9a1ed7b37befdd8e29d233fe55cd62362df3c50e
|