From bb1cfdfe1fd1945f99a5191ac2ded6e35826bea5 Mon Sep 17 00:00:00 2001 From: Doug Barton Date: Tue, 28 Jul 2009 22:13:34 +0000 Subject: Update to patched versions which address a remote DoS vulnerability: Receipt of a specially-crafted dynamic update message may cause BIND 9 servers to exit. This vulnerability affects all servers -- it is not limited to those that are configured to allow dynamic updates. Access controls will not provide an effective workaround. More details can be found here: https://www.isc.org/node/474 All BIND users are encouraged to update to a patched version ASAP. --- dns/bind94/Makefile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'dns/bind94/Makefile') diff --git a/dns/bind94/Makefile b/dns/bind94/Makefile index 245125108e96..d73f3d93dd58 100644 --- a/dns/bind94/Makefile +++ b/dns/bind94/Makefile @@ -12,7 +12,7 @@ # release you can generally build it cleanly from the source - Doug PORTNAME= bind94 -PORTVERSION= 9.4.3.2 +PORTVERSION= 9.4.3.3 CATEGORIES= dns net ipv6 MASTER_SITES= ${MASTER_SITE_ISC} \ http://dougbarton.us/Downloads/%SUBDIR%/ @@ -25,7 +25,7 @@ MAINTAINER= dougb@FreeBSD.org COMMENT= The BIND DNS suite with updated DNSSEC and threads # ISC releases things like 9.4.0b3, which our versioning doesn't like -ISCVERSION= 9.4.3-P2 +ISCVERSION= 9.4.3-P3 MAKE_JOBS_UNSAFE= yes -- cgit v1.2.3