On June 28 CERT released an advisory (CA-2002-19) citing a buffer
overflow problem in applications that are compiled with DNS resolver
libraries from ISC BIND (libbind) and BSD (libc).  Because of this
vulnerability and others, ISC strongly recommends that BIND be upgraded
to Version 9.2.1.

I am not aware of any information or updates that have been released by
Red Hat concerning this vulnerability.  Further, I have been unable to
find a Red Hat RPM for BIND 9.2.1.

Would someone please let me know if there are fixes available for this
advisory, including an RPM for BIND 9.2.1?  Failing that, has Red Hat
released any information concerning this vulnerability?

Thank you,
Ken Traynham



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to