freebsd-ports/dns/bind96/distinfo
Doug Barton 400315c158 Include a patch from ISC to deal with the following vulnerability:
Name:			BIND: Self Check Failing [Added 2005.25.01]
Versions affected:	BIND 9.3.0
Severity:		LOW
Exploitable:		Remotely
Type:			Denial of Service
Description:
An incorrect assumption in the validator (authvalidated) can result in a
REQUIRE (internal consistancy) test failing and named exiting.

Workarounds:
Turn off dnssec validation (off by default) at the options/view level.

	dnssec-enable no;

Active Exploits:	None known

Bump PORTREVISION accordingly.

It should be noted that the vast majority of users would not have
DNSSEC enabled, and therefore are not vulnerable to this bug.
2005-01-28 20:47:44 +00:00

9 lines
361 B
Plaintext

MD5 (bind-9.3.0.tar.gz) = fdb42fff7e345372ac52a4493b77b694
SIZE (bind-9.3.0.tar.gz) = 4730656
MD5 (bind-9.3.0.tar.gz.asc) = 131e73f617c649652c6218826bdc92f8
SIZE (bind-9.3.0.tar.gz.asc) = 186
MD5 (9.3.0-patch1) = 90733dadf1487e035a8b94951e55fbb7
SIZE (9.3.0-patch1) = 1019
MD5 (9.3.0-patch1.asc) = 4c8072f375fa53e5ada4e0e4f67402c0
SIZE (9.3.0-patch1.asc) = 187