]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/commit - tools/diag/ac/cknames.pl
Upgrade to BIND 9.8.1-P1 to address the following DDOS bug:
authorDoug Barton <dougb@FreeBSD.org>
Thu, 17 Nov 2011 00:25:35 +0000 (00:25 +0000)
committerDoug Barton <dougb@FreeBSD.org>
Thu, 17 Nov 2011 00:25:35 +0000 (00:25 +0000)
commitb62e898e004458d9f65904b6d1b9ce58366ef790
treeaa4de14f8e91fd75c927a2e03a501d1904ea5da0
parent017f1c8db9a43f7e3834c4cb77424e0508166a27
parent3939884dc90db099f5601bd7c27d39acf7a8c731
Upgrade to BIND 9.8.1-P1 to address the following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313
contrib/bind9/CHANGES
contrib/bind9/bin/named/query.c
contrib/bind9/lib/dns/rbtdb.c
contrib/bind9/version