]> CyberLeo.Net >> Repos - FreeBSD/releng/9.0.git/commit
Upgrade to BIND 9.8.1-P1 to address the following DDOS bug:
authordougb <dougb@ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f>
Thu, 1 Dec 2011 21:17:59 +0000 (21:17 +0000)
committerdougb <dougb@ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f>
Thu, 1 Dec 2011 21:17:59 +0000 (21:17 +0000)
commit1042a29aafb32a40f68a189c3481f24110172b37
tree2e41eb824aae8696607a342a8765fa1bd16bee09
parent306830ca32075a06105bd0346e9213462711186b
Upgrade to BIND 9.8.1-P1 to address the following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-4313
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Approved by: re (kib)

git-svn-id: svn://svn.freebsd.org/base/releng/9.0@228190 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f
contrib/bind9/CHANGES
contrib/bind9/bin/named/query.c
contrib/bind9/lib/dns/rbtdb.c
contrib/bind9/version