| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
| |
Notes:
svn path=/stable/6/; revision=186999
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
to root server addresses, and a fix for the vulnerability mentioned
here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122
Users of BIND 9.3.x are strongly encouraged to upgrade to this
version. Also, the 9.3.x branch is now in maintenance-only mode.
Users are encouraged to investigate BIND 9.4.x or perhaps 9.5.x.
http://www.isc.org/index.pl?/sw/bind/versions_and_support.php
This udpate is being done by updating the files directly in this
branch rather than an import + MFC because BIND in HEAD is 9.4.x.
Notes:
svn path=/stable/6/; revision=179502
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.
This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.
All users are encouraged to upgrade.
See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
Notes:
svn path=/stable/6/; revision=171580
|
| |
|
|
| |
Notes:
svn path=/stable/6/; revision=166542
|
| |
|
|
|
|
|
| |
Approved by: re (kensmith)
Notes:
svn path=/stable/6/; revision=165161
|
| |
|
|
| |
Notes:
svn path=/stable/6/; revision=154346
|
| |
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=143731
|
|
|
Notes:
svn path=/vendor/bind9/dist/; revision=135446
|