freebsd-dev/contrib/bind9/lib
Doug Barton 7c9d9e417a Update to version 9.6-ESV-R4-P3
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerability:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
2011-07-06 00:48:31 +00:00
..
bind9 Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
dns Update to version 9.6-ESV-R4-P3 2011-07-06 00:48:31 +00:00
isc Apply bug fixes 2011-07-06 00:47:27 +00:00
isccc Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
isccfg Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
lwres Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
Makefile.in Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00