On June 28 CERT released an advisory (CA-2002-19) citing a buffer overflow problem in applications that are compiled with DNS resolver libraries from ISC BIND (libbind) and BSD (libc). Because of this vulnerability and others, ISC strongly recommends that BIND be upgraded to Version 9.2.1.
I am not aware of any information or updates that have been released by Red Hat concerning this vulnerability. Further, I have been unable to find a Red Hat RPM for BIND 9.2.1. Would someone please let me know if there are fixes available for this advisory, including an RPM for BIND 9.2.1? Failing that, has Red Hat released any information concerning this vulnerability? Thank you, Ken Traynham _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list