On Fri, Nov 18, 2011 at 6:11 AM, Jack Tavares <j.tava...@f5.com> wrote:
> Thank you again. And I agree that upgrading is the best option, however
> I was looking for any possible mitigations to the problem for the
> (unfortunately unavoidable) period of time it will take vendors
> to provide patched bind servers.

Which "vendors" are you talking about? AFAIK most linux distros have
special release policy w.r.t. critical security updates, so they
should be available not long after a CVE was published. For example:
https://www.isc.org/software/bind/advisories/cve-2011-4313 => Nov 16
https://rhn.redhat.com/errata/RHSA-2011-1458.html => updated package
available on Nov 17

Another alternative (if you can't wait one day) is to build the
package yourself, assuming you have sufficient knowldege about patches
and your distro's build system (e.g. rebuilding SRPM).

-- 
Fajar
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to