Date: Thu, 18 Dec 2014 10:23:43 -0600 From: chris <chris@bsdjunk.com> To: Zoran Kolic <zkolic@sbb.rs> Cc: freebsd-security@freebsd.org, cpet@sdf.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound Message-ID: <14a5e364840.d7cf188633233.7838236330435139778@bsdjunk.com> In-Reply-To: <20141218161306.GA21957@knossos> References: <mailman.87.1418904002.80773.freebsd-security@freebsd.org> <20141218161306.GA21957@knossos>
next in thread | previous in thread | raw e-mail | index | archive | help
This is weird as I now get a thing that "Directory's required to be removed ..." and that directory is "/" will this be fixed as this is kinda scary seeing "Directory couldn't be removed "rmdir /////" or something it showed.
---- On Thu, 18 Dec 2014 10:13:07 -0600 zkolic@sbb.rs wrote ---- > The first part of that statement is false. The dns/unbound port was
> fixed for CVE-2014-8602 on 9 December. Thus a valid work around is to
> disable local_unbound and use ports/dns/unbound.
To ask explicitelly: this does not affect 9.3?
I see no unbound nor local_unbound on stock install.
Best regards
Zoran
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
From owner-freebsd-security@FreeBSD.ORG Thu Dec 18 16:40:21 2014
Return-Path: <owner-freebsd-security@FreeBSD.ORG>
Delivered-To: freebsd-security@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTPS id 8A293AA5
for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 16:40:21 +0000 (UTC)
Received: from mail-wi0-f170.google.com (mail-wi0-f170.google.com
[209.85.212.170])
(using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
(Client CN "smtp.gmail.com",
Issuer "Google Internet Authority G2" (verified OK))
by mx1.freebsd.org (Postfix) with ESMTPS id 1E84A166B
for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 16:40:20 +0000 (UTC)
Received: by mail-wi0-f170.google.com with SMTP id bs8so2169369wib.5
for <freebsd-security@freebsd.org>; Thu, 18 Dec 2014 08:40:12 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20130820;
h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to
:subject:references:in-reply-to:content-type
:content-transfer-encoding;
bh=+EHgC/9aFOxx/UZD8co0tBK/h5qnE5H1U3lYEBGeUC4=;
b=RwzMqnhBicgGE9fjVr+B50mLAle2/n8fTdA33LzxNMx65DCbVCM5E5E7hQQUeveh7s
2gjl4keCVOz8MwMfRtsTyDhRCo/HBvPGFyGyFvaCqTb59y4BY8G8BKSM9foimGLVF+dh
UCWsJpJeQNh7cGrQbOaB6QOHr0RqffPE1cybg3by/4ZjEj/E5HJrsTM/XYoRG0gJIeQB
iYOS/4mWkGCGI749duQmCzZHkgBe6/K2kMc4rsUoB0KkSomBhTATqaenc8tvD0WQEW6r
1p/CLmva6AIC3cmfP6LCrO97K6AyYsxLt0I21VeJG1o2oB0YPRnRJ4jhN2LZRdnmH+cJ
NmPA==
X-Gm-Message-State: ALoCoQnElODyG4YUDgQUJLT5YQ84y5E2n62jxXO7BAiwkFU5/n0P+tJXccS9q0wtkxHhgLQsVvEQ
X-Received: by 10.180.103.6 with SMTP id fs6mr25530914wib.11.1418920812434;
Thu, 18 Dec 2014 08:40:12 -0800 (PST)
Received: from [10.10.1.68] (82-69-141-170.dsl.in-addr.zen.co.uk.
[82.69.141.170])
by mx.google.com with ESMTPSA id r3sm25372262wic.10.2014.12.18.08.40.11
for <freebsd-security@freebsd.org>
(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Thu, 18 Dec 2014 08:40:11 -0800 (PST)
Message-ID: <5493034B.7020102@multiplay.co.uk>
Date: Thu, 18 Dec 2014 16:39:39 +0000
From: Steven Hartland <killing@multiplay.co.uk>
User-Agent: Mozilla/5.0 (Windows NT 5.1;
rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: freebsd-security@freebsd.org
Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
References: <mailman.87.1418904002.80773.freebsd-security@freebsd.org>
<20141218161306.GA21957@knossos>
In-Reply-To: <20141218161306.GA21957@knossos>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-BeenThere: freebsd-security@freebsd.org
X-Mailman-Version: 2.1.18-1
Precedence: list
List-Id: "Security issues \[members-only posting\]"
<freebsd-security.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/options/freebsd-security>,
<mailto:freebsd-security-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-security/>
List-Post: <mailto:freebsd-security@freebsd.org>
List-Help: <mailto:freebsd-security-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-security>,
<mailto:freebsd-security-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 16:40:21 -0000
Nope unbound was the replacement for bind in 10.x+
On 18/12/2014 16:13, Zoran Kolic wrote:
>> The first part of that statement is false. The dns/unbound port was
>> fixed for CVE-2014-8602 on 9 December. Thus a valid work around is to
>> disable local_unbound and use ports/dns/unbound.
> To ask explicitelly: this does not affect 9.3?
> I see no unbound nor local_unbound on stock install.
> Best regards
>
> Zoran
>
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14a5e364840.d7cf188633233.7838236330435139778>
