Date: Sun, 28 Jul 2013 12:03:43 +0300 From: Kimmo Paasiala <kpaasial@gmail.com> To: freebsd-security <freebsd-security@freebsd.org> Subject: Re: bind9 and CVE-2013-4854 Message-ID: <CA%2B7WWSejypEnci4vrDm=sNDP5RZyojsHHFb%2BJYsHxLjKQR4CyA@mail.gmail.com> In-Reply-To: <20130727210809.GA70513@lonrach.local> References: <20130726230549.GB64252@lonrach.local> <CAMCLrkF8u-UmMnfG9=RkGMWYZn%2BL4vK7Mg1XW_pa9HbdLx4r8w@mail.gmail.com> <20130727085458.GB68862@lonrach.local> <46029EF7-D574-4953-AE8D-4BA79F5295BB@plosh.net> <20130727210809.GA70513@lonrach.local>
next in thread | previous in thread | raw e-mail | index | archive | help
A question related to this: What is it that prevents BIND from being removed from the base when there are very well working ports of BIND already that are far easier to update when vulnerabilities are found. Is it the dig(1), host(1) and nslookup(1) utilities? -Kimmo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2B7WWSejypEnci4vrDm=sNDP5RZyojsHHFb%2BJYsHxLjKQR4CyA>