]> CyberLeo.Net >> Repos - FreeBSD/stable/8.git/commit - contrib/bind9/bin/named/query.c
Upgrade to BIND 9.6-ESV-R5-P1 to address the following DDOS bug:
authordougb <dougb@ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f>
Thu, 17 Nov 2011 00:36:10 +0000 (00:36 +0000)
committerdougb <dougb@ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f>
Thu, 17 Nov 2011 00:36:10 +0000 (00:36 +0000)
commit51e3f1116d40ce6dec06b55d369f9afd48142866
tree7b9d07469ffbf9628c247a5028c5057c71bfcd0b
parent395128bb2b3c75a0de2ac990338c8666cc582ce5
Upgrade to BIND 9.6-ESV-R5-P1 to address the following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

git-svn-id: svn://svn.freebsd.org/base/stable/8@227599 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f
contrib/bind9/CHANGES
contrib/bind9/bin/named/query.c
contrib/bind9/lib/dns/rbtdb.c
contrib/bind9/version