Dempsky reports and DJB confirms authority poisoning vulnerability in some tinydns/axfrdns configurations. See for ex. http://article.gmane.org/gmane.comp.security.bugtraq/39157 Maintainer, please update. Thanks! How-To-Repeat: See Dempsky's bugtraq email
Responsible Changed From-To: freebsd-ports-bugs->roam Over to maintainer (via the GNATS Auto Assign Tool)
roam 2009-03-06 16:20:17 UTC FreeBSD ports repository Modified files: dns/djbdns Makefile Added files: dns/djbdns/files patch-response.c Log: Fix the AXFR subdomain overwrite vulnerability discovered by Matthew Dempsky. Also, fix the quoting of the BROKEN messages. PR: 132366, 132349 Submitted by: Renato Botelho <garga@FreeBSD.org>, Howard Goldstein <hg@queue.to> Revision Changes Path 1.34 +3 -3 ports/dns/djbdns/Makefile 1.1 +11 -0 ports/dns/djbdns/files/patch-response.c (new) _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed I've just committed a very similar patch. Thanks!