freebsd-skq/contrib/bind9/bin
Doug Barton 7c9d9e417a Update to version 9.6-ESV-R4-P3
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerability:

CVE-2011-2464
=============
Severity:	High
Exploitable:	Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
2011-07-06 00:48:31 +00:00
..
check Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
dig Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
dnssec Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
named Update to version 9.6-ESV-R4-P3 2011-07-06 00:48:31 +00:00
nsupdate Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
rndc Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00
Makefile.in Upgrade to 9.6-ESV-R4-P1, which address the following issues: 2011-05-28 00:21:28 +00:00