| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=174187
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
1. The default access control lists (acls) are not being
correctly set. If not set anyone can make recursive queries
and/or query the cache contents.
See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925
2. The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.
This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.
All users are encouraged to upgrade.
See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
Approved by: re (kensmith, implicit)
Notes:
svn path=/vendor/bind9/dist/; revision=171577
|
|
|
|
|
|
|
|
|
| |
code we already have assembly versions of.
Written by: imp
Notes:
svn path=/vendor/bind9/dist/; revision=170349
|
|
|
|
|
|
|
| |
present in BIND 9.4.1.
Notes:
svn path=/vendor/bind9/dist/; revision=170225
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=170222
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=166332
|
|
|
|
|
|
|
| |
9.3.3 sources.
Notes:
svn path=/vendor/bind9/dist/; revision=165078
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=165071
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
announced by ISC dated 31 October (delivered via e-mail to the
bind-announce@isc.org list on 2 November):
Description:
Because of OpenSSL's recently announced vulnerabilities
(CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named,
we are announcing this workaround and releasing patches. A proof of
concept attack on OpenSSL has been demonstrated for CAN-2006-4339.
OpenSSL is required to use DNSSEC with BIND.
Fix for version 9.3.2-P1 and lower:
Upgrade to BIND 9.3.2-P2, then generate new RSASHA1 and
RSAMD5 keys for all old keys using the old default exponent
and perform a key rollover to these new keys.
These versions also change the default RSA exponent to be
65537 which is not vulnerable to the attacks described in
CAN-2006-4339.
Notes:
svn path=/vendor/bind9/dist/; revision=163976
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
vulnerabilities:
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
2066. [security] Handle SIG queries gracefully. [RT #16300]
http://www.kb.cert.org/vuls/id/697164
1941. [bug] ncache_adderesult() should set eresult even if no
rdataset is passed to it. [RT #15642]
All users of BIND 9 are encouraged to upgrade to this version.
Notes:
svn path=/vendor/bind9/dist/; revision=162079
|
|
|
|
|
|
|
| |
in BIND 9.3.2 that were mistakenly removed from HEAD.
Notes:
svn path=/vendor/bind9/dist/; revision=154334
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
part of the structure was a hack to maintain binary compatibility with
Sun binaries, and my understanding is that it's not needed generally
on sparc systems running other operating systems. Therefore, hide this
code behind the same set of tests as in lib/bind/include/netdb.h.
This file is being imported on the vendor branch because a similar change
(or change with similar effect) will be in the next version of BIND 9.
This change will not affect other platforms in any way.
Notes:
svn path=/vendor/bind9/dist/; revision=154032
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=153816
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
researched by glebius, and incorporated by ISC into the next
version of BIND. Unfortunately, it looks like their release
will come after the release of FreeBSD 6, so we will bring
this in now.
The patch addresses a problem with high-load resolvers which
hit memory barriers. Without this patch, running the resolving
name server out of memory would lead to "unpredictable results."
Of course, the canonical answer to this problem is to put more
memory into the system, however that is not always possible, and
the code should be able to handle this situation gracefully in
any case.
Notes:
svn path=/vendor/bind9/dist/; revision=149245
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=143734
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=143731
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=135601
|
|
|
|
| |
Notes:
svn path=/vendor/bind9/dist/; revision=135550
|
|
|
|
|
|
|
|
|
| |
These three files were missed in the original import because their names
contained the magic letters w, i and n in that sequence.
Notes:
svn path=/vendor/bind9/dist/; revision=135471
svn path=/vendor/bind9/9.3.0rc4/; revision=135473; tag=vendor/bind9/9.3.0rc4
|
|
Notes:
svn path=/vendor/bind9/dist/; revision=135446
|