On Jul 7, 2011 6:40 PM, "Glen Barber" <glen.j.bar...@gmail.com> wrote: > > On 7/7/11 8:43 PM, Michael Scheidell wrote: > > < http://threatpost.com/en_us/blogs/new-bind-release-fixes-high-severity-remote-bugs-070611 > > > > > > > The high-severity vulnerability in many versions of the BIND software > > has the effect of causing the BIND server to exit when it receives a > > specially formatted packet. The ISC said that although it isn't aware of > > any public exploits for the bug, it still recommends that organizations > > upgrade to one of the newer versions of BIND, which include > > 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4. > > > > See: > > http://svnweb.freebsd.org/base?view=revision&revision=223815 >
Are there plans to update 8.2-RELEASE as well? Thanks, Josh > Regards, > > -- > Glen Barber > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org " _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"