Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Dec 2014 10:23:43 -0600
From:      chris <chris@bsdjunk.com>
To:        Zoran Kolic <zkolic@sbb.rs>
Cc:        freebsd-security@freebsd.org, cpet@sdf.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
Message-ID:  <14a5e364840.d7cf188633233.7838236330435139778@bsdjunk.com>
In-Reply-To: <20141218161306.GA21957@knossos>
References:  <mailman.87.1418904002.80773.freebsd-security@freebsd.org> <20141218161306.GA21957@knossos>

next in thread | previous in thread | raw e-mail | index | archive | help
This is weird as I now get a thing that "Directory's required to be removed ..." and that directory is "/" will this be fixed as this is kinda scary seeing "Directory couldn't be removed "rmdir /////" or something it showed.



---- On Thu, 18 Dec 2014 10:13:07 -0600 zkolic@sbb.rs wrote ---- > The first part of that statement is false.  The dns/unbound port was 

> fixed for CVE-2014-8602 on 9 December.  Thus a valid work around is to 

> disable local_unbound and use ports/dns/unbound.



To ask explicitelly: this does not affect 9.3?

I see no unbound nor local_unbound on stock install.

Best regards



                       Zoran



_______________________________________________

freebsd-security@freebsd.org mailing list

http://lists.freebsd.org/mailman/listinfo/freebsd-security

To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
From owner-freebsd-security@FreeBSD.ORG  Thu Dec 18 16:40:21 2014
Return-Path: <owner-freebsd-security@FreeBSD.ORG>
Delivered-To: freebsd-security@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by hub.freebsd.org (Postfix) with ESMTPS id 8A293AA5
 for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 16:40:21 +0000 (UTC)
Received: from mail-wi0-f170.google.com (mail-wi0-f170.google.com
 [209.85.212.170])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (verified OK))
 by mx1.freebsd.org (Postfix) with ESMTPS id 1E84A166B
 for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 16:40:20 +0000 (UTC)
Received: by mail-wi0-f170.google.com with SMTP id bs8so2169369wib.5
 for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 08:40:12 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to
 :subject:references:in-reply-to:content-type
 :content-transfer-encoding;
 bh=+EHgC/9aFOxx/UZD8co0tBK/h5qnE5H1U3lYEBGeUC4=;
 b=RwzMqnhBicgGE9fjVr+B50mLAle2/n8fTdA33LzxNMx65DCbVCM5E5E7hQQUeveh7s
 2gjl4keCVOz8MwMfRtsTyDhRCo/HBvPGFyGyFvaCqTb59y4BY8G8BKSM9foimGLVF+dh
 UCWsJpJeQNh7cGrQbOaB6QOHr0RqffPE1cybg3by/4ZjEj/E5HJrsTM/XYoRG0gJIeQB
 iYOS/4mWkGCGI749duQmCzZHkgBe6/K2kMc4rsUoB0KkSomBhTATqaenc8tvD0WQEW6r
 1p/CLmva6AIC3cmfP6LCrO97K6AyYsxLt0I21VeJG1o2oB0YPRnRJ4jhN2LZRdnmH+cJ
 NmPA==
X-Gm-Message-State: ALoCoQnElODyG4YUDgQUJLT5YQ84y5E2n62jxXO7BAiwkFU5/n0P+tJXccS9q0wtkxHhgLQsVvEQ
X-Received: by 10.180.103.6 with SMTP id fs6mr25530914wib.11.1418920812434;
 Thu, 18 Dec 2014 08:40:12 -0800 (PST)
Received: from [10.10.1.68] (82-69-141-170.dsl.in-addr.zen.co.uk.
 [82.69.141.170])
 by mx.google.com with ESMTPSA id r3sm25372262wic.10.2014.12.18.08.40.11
 for <freebsd-security@freebsd.org>
 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Thu, 18 Dec 2014 08:40:11 -0800 (PST)
Message-ID: <5493034B.7020102@multiplay.co.uk>
Date: Thu, 18 Dec 2014 16:39:39 +0000
From: Steven Hartland <killing@multiplay.co.uk>
User-Agent: Mozilla/5.0 (Windows NT 5.1;
 rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: freebsd-security@freebsd.org
Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
References: <mailman.87.1418904002.80773.freebsd-security@freebsd.org>
 <20141218161306.GA21957@knossos>
In-Reply-To: <20141218161306.GA21957@knossos>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-BeenThere: freebsd-security@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: "Security issues \[members-only posting\]"
 <freebsd-security.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/options/freebsd-security>, 
 <mailto:freebsd-security-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security/>;
List-Post: <mailto:freebsd-security@freebsd.org>
List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-security>, 
 <mailto:freebsd-security-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 16:40:21 -0000

Nope unbound was the replacement for bind in 10.x+

On 18/12/2014 16:13, Zoran Kolic wrote:
>> The first part of that statement is false.  The dns/unbound port was
>> fixed for CVE-2014-8602 on 9 December.  Thus a valid work around is to
>> disable local_unbound and use ports/dns/unbound.
> To ask explicitelly: this does not affect 9.3?
> I see no unbound nor local_unbound on stock install.
> Best regards
>
>                         Zoran
>
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14a5e364840.d7cf188633233.7838236330435139778>