Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 Jul 2013 12:03:43 +0300
From:      Kimmo Paasiala <kpaasial@gmail.com>
To:        freebsd-security <freebsd-security@freebsd.org>
Subject:   Re: bind9 and CVE-2013-4854
Message-ID:  <CA%2B7WWSejypEnci4vrDm=sNDP5RZyojsHHFb%2BJYsHxLjKQR4CyA@mail.gmail.com>
In-Reply-To: <20130727210809.GA70513@lonrach.local>
References:  <20130726230549.GB64252@lonrach.local> <CAMCLrkF8u-UmMnfG9=RkGMWYZn%2BL4vK7Mg1XW_pa9HbdLx4r8w@mail.gmail.com> <20130727085458.GB68862@lonrach.local> <46029EF7-D574-4953-AE8D-4BA79F5295BB@plosh.net> <20130727210809.GA70513@lonrach.local>

next in thread | previous in thread | raw e-mail | index | archive | help
A question related to this:

What is it that prevents BIND from being removed from the base when
there are very well working ports of BIND already that are far easier
to update when vulnerabilities are found. Is it the dig(1), host(1)
and nslookup(1) utilities?

-Kimmo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2B7WWSejypEnci4vrDm=sNDP5RZyojsHHFb%2BJYsHxLjKQR4CyA>