FreeBSD VuXML

Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Security issues that affect the FreeBSD operating system or applications in the FreeBSD Ports Collection are documented using the Vulnerabilities and Exposures Markup Language (VuXML). The current VuXML document that serves as the source for the content of this site can be found:

Please report security issues to the FreeBSD Security Team at . Full contact details, including information handling policies and PGP key, can be found on the FreeBSD Security page.

bind98


Entered Topic
2016-03-28 bind -- denial of service vulnerability
bind -- denial of service vulnerability
2014-12-11 bind -- denial of service vulnerability
2014-01-13 bind -- denial of service vulnerability
2013-07-26 bind -- denial of service vulnerability
2013-06-06 dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone
2013-03-27 dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion
2012-12-04 dns/bind9* -- servers using DNS64 can be crashed by a crafted query
2012-10-10 dns/bind9* -- crash on deliberately constructed combination of records
2012-09-18 dns/bind9* -- Several vulnerabilities
2012-07-24 dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure
2012-06-04 dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory
2011-11-16 BIND -- Remote DOS
2011-07-05 BIND -- Remote DoS against authoritative and recursive servers
BIND -- Remote DoS with certain RPZ configurations
2011-06-04 BIND -- Large RRSIG RRsets and Negative Caching DoS