Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Dec 2014 10:12:19 -0800
From:      Darren Pilgrim <list_freebsd@bluerosetech.com>
To:        freebsd-security@freebsd.org,  FreeBSD Security Advisories <security-advisories@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
Message-ID:  <5491C783.8060303@bluerosetech.com>
In-Reply-To: <20141217083643.E0059421C@nine.des.no>
References:  <20141217083643.E0059421C@nine.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On 12/17/2014 12:36 AM, FreeBSD Security Advisories wrote:
> IV.  Workaround
>
> No workaround is available, but hosts not running unbound(8) are not
> vulnerable.

The first part of that statement is false.  The dns/unbound port was 
fixed for CVE-2014-8602 on 9 December.  Thus a valid work around is to 
disable local_unbound and use ports/dns/unbound.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5491C783.8060303>