aboutsummaryrefslogtreecommitdiffstats
path: root/dns/bind94/distinfo
diff options
context:
space:
mode:
authordougb <dougb@FreeBSD.org>2007-07-25 06:00:03 +0800
committerdougb <dougb@FreeBSD.org>2007-07-25 06:00:03 +0800
commit2af50d76e920a990bf163a42f7258801e2bc53c1 (patch)
tree4378266c48acb674e130df0081f82693666f46a0 /dns/bind94/distinfo
parent59aa86827613710d17b14e4b0ee8a23efed5aed0 (diff)
downloadfreebsd-ports-gnome-2af50d76e920a990bf163a42f7258801e2bc53c1.tar.gz
freebsd-ports-gnome-2af50d76e920a990bf163a42f7258801e2bc53c1.tar.zst
freebsd-ports-gnome-2af50d76e920a990bf163a42f7258801e2bc53c1.zip
Update to 9.3.4-P1, which fixes the following:
The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
Diffstat (limited to 'dns/bind94/distinfo')
0 files changed, 0 insertions, 0 deletions