summaryrefslogtreecommitdiffstats
path: root/usr.sbin/pwd_mkdb
diff options
context:
space:
mode:
authordougb <dougb@FreeBSD.org>2011-07-06 00:48:31 +0000
committerdougb <dougb@FreeBSD.org>2011-07-06 00:48:31 +0000
commita56bc34bcb01041f2678d50c784cf1676b386aa4 (patch)
treee2f081f6053b6868f97bb2f937aeb23d613958a3 /usr.sbin/pwd_mkdb
parent28d62831de06efc82624596849d25e9d6510caef (diff)
downloadFreeBSD-src-a56bc34bcb01041f2678d50c784cf1676b386aa4.zip
FreeBSD-src-a56bc34bcb01041f2678d50c784cf1676b386aa4.tar.gz
Update to version 9.6-ESV-R4-P3
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerability: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464
Diffstat (limited to 'usr.sbin/pwd_mkdb')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud