bind9 and CVE-2013-4854

看板FB_security作者時間12年前 (2013/07/27 07:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/10 (看更多)
I have updated both dns/bind98 and dns/bind99 to fix CVE-2013-4854 as indicated in https://kb.isc.org/article/AA-01015/0 A specially crafted query that includes malformed rdata can cause named to terminate with an assertion failure while rejecting the malformed query. BIND 9.6 and BIND 9.6-ESV are unaffected by this problem. Earlier branches of BIND 9 are believed to be unaffected but have not been tested. BIND 10 is also unaffected by this issue. Please Note: All versions of BIND 9.7 are known to be affected, but these branches are beyond their "end of life" (EOL) and no longer receive testing or security fixes from ISC. For current information on which versions are actively supported, please see http://www.isc.org/downloads/software-support-policy/bind-software-status/. -- Ollivier ROBERT -=- FreeBSD: The Power to Serve! -=- roberto@keltia.freenix.fr In memoriam to Ondine : http://ondine.keltia.net/ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1HymRoMB (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1HymRoMB (FB_security)