On 01/10/2017 03:40 AM, Michelle Konzack wrote:
Hello experts,
/me looks over his shoulders wondering who's being addressed.
I do not want to querry the world, but only my own Name Server for CNAME
configured (or not).
Okay. ONLY use local data. Check.
Currently I am updating my web adm
ISC has issued new security releases of BIND today, correcting
three exploitable vulnerabilities discovered in the course of our
internal fuzz-testing and an additional exploitable vulnerability
reported to us by a contributor.
The issues are:
CVE-2016-9131
CVE-2016-9147
CVE-2016-9444
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
http://www.five-ten-sg.com/mapper/bind contains links to the source
rpms, and build instructions.
This version patches the ISC python code to build/run on the versions of
Python that are standard on RHEL/Centos 5,6,7.
-BEGIN PGP SIGNATURE-
3 matches
Mail list logo