On Thu, Nov 17, 2011 at 11:40 PM, Matthew Seaman <m.sea...@infracaninophile.co.uk> wrote: > On 18/11/2011 04:22, sys Admin wrote: >> On Thursday, November 17, 2011, Mike Tancsa <m...@sentex.net> wrote: >>> On 11/17/2011 9:29 PM, sys Admin wrote: >>>> Hi >>>> Any plans to apply these patches to the bind version shipped with >> FreeBSD ? >>>> >>>> http://www.isc.org/software/bind/advisories/cve-2011-tbd >>> >>> Hi, >>> They were committed already to RELENG_7,8 and 9 >>> >>> eg >>> >> http://lists.freebsd.org/pipermail/svn-src-stable-8/2011-November/006315.html >>> >>> >>> >>> ---Mike >>> >> >> Not sure how I missed but thanks ! > > Actually, it was patched in stable/7, stable/8, HEAD and ports -- > stable/9 is notably missing from that list. Presumably stable/9 will be > patched eventually, but as it's in the process of forking of the > release/9.0 branch right now, the bind patches will have to wait.
stable/{7,8} and HEAD have the "best known fix" but we are still waiting for a final one (or decide if the existing solution had solved the problem completely, ISC is still working on investigation). We (secteam@) will issue a security advisory once we are sure that the fix is finalized and yes, all supported branches would be patched at that time and update would made available through freebsd-update, etc. At this time it's advisable that users use the BIND version from ports, or use an alternative (e.g. dns/unbound), if resolving DNS server functionality is desired; it seems that authoritive-only DNS servers are NOT affected by the problem as far as we know. Cheers, -- Xin LI <delp...@delphij.net> https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"