Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Security issues that affect the FreeBSD operating system or applications in the FreeBSD Ports Collection are documented using the Vulnerabilities and Exposures Markup Language (VuXML). The current VuXML document that serves as the source for the content of this site can be found:

Please report security issues to the FreeBSD Security Team at . Full contact details, including information handling policies and PGP key, can be found on the FreeBSD Security page.


Entered Topic
2014-12-11 bind -- denial of service vulnerability
2014-01-13 bind -- denial of service vulnerability
2013-06-06 dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone
2012-10-10 dns/bind9* -- crash on deliberately constructed combination of records
2012-09-18 dns/bind9* -- Several vulnerabilities
2012-07-24 dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure
2012-06-04 dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory
2011-11-16 BIND -- Remote DOS
2011-07-05 BIND -- Remote DoS against authoritative and recursive servers
2011-06-04 BIND -- Large RRSIG RRsets and Negative Caching DoS