ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerability: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464
11 lines
220 B
Plaintext
11 lines
220 B
Plaintext
# $Id: version,v 1.43.12.11.2.2.2.3 2011-06-21 20:35:59 each Exp $
|
|
#
|
|
# This file must follow /bin/sh rules. It is imported directly via
|
|
# configure.
|
|
#
|
|
MAJORVER=9
|
|
MINORVER=6
|
|
PATCHVER=
|
|
RELEASETYPE=-ESV
|
|
RELEASEVER=-R4-P3
|