jakob@ and myself. See http://www.unbound.net/downloads/CVE-2011-4528.txt for more details, summary from the above is below: -- Unbound crashes when confronted with a non-standard response from a server for a domain. This domain produces duplicate RRs from a certain type and is DNSSEC signed.Unbound also crashes when confronted with a query that eventually, and under specific circumstances, resolves to a domain that misses expected NSEC3 records. These two problems were discovered within 24 hours, hence a combined vulnerability disclosure. By constructing the non standard responses an attacker can use these vulnerabilities for a DOS attack. To our knowledge 'denial of service' is the only type of exploit possible. --
Documentation for the ports tree: ports(7), packages(7), mirroring-ports(7), library-specs(7), bsd.port.mk(5), bsd.port.arch.mk(5), port-modules(5). dpb(1) (manpage under ${PORTSDIR}/man) for bulk builds. See also the OpenBSD Porter's Handbook http://www.openbsd.org/faq/ports/ $OpenBSD: README,v 1.20 2011/11/15 18:33:16 espie Exp $
Description
Public git conversion mirror of OpenBSD's official cvs ports repository. Pull requests not accepted - send diffs to the ports@ mailing list.
Languages
Makefile
61%
PHP
18.9%
Perl
6.5%
C
4.6%
HTML
2.3%
Other
6.4%