As described here:
http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html
If I understand this correctly our accept filters will have zero effect
on stopping this exploit, correct?
___
freebsd-security@freebsd.org mailing list
Mark Felder wrote this message on Fri, Jul 26, 2013 at 06:40 -0500:
As described here:
http://lists.grok.org.uk/pipermail/full-disclosure/2013-July/091084.html
If I understand this correctly our accept filters will have zero effect
on stopping this exploit, correct?
Depending upon where the
I have updated both dns/bind98 and dns/bind99 to fix CVE-2013-4854 as indicated
in
https://kb.isc.org/article/AA-01015/0
A specially crafted query that includes malformed rdata can cause named to
terminate with an assertion failure while rejecting the malformed query.
BIND 9.6 and BIND 9.6-ESV
I have updated both dns/bind98 and dns/bind99 to fix CVE-2013-4854 as
indicated in
https://kb.isc.org/article/AA-01015/0
Thank you very much for that. Does this include the RRL/RPZ patches?
mark
___
freebsd-security@freebsd.org mailing list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-13:07.bind Security Advisory
The FreeBSD Project
Topic: