------------------------------------------------------------ Arch Linux Security Warning ALSW 2007-#30 ------------------------------------------------------------
Name: bind Date: 2007-05-10 Severity: Medium Warning #: 2007-#30 ------------------------------------------------------------ Product Background =================== BIND (Berkeley Internet Name Domain) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System, Problem Background - Impact =================== A vulnerability in ISC BIND 9.4.0, when recursion is enabled, could allow a remote attacker to cause a denial of service (daemon exit) via a certain sequence of queries. Problem Packages =================== Package: bind Repo: current Group: daemons Unsafe: < 9.4.1 Safe: >= 9.4.1 Package Fix =================== Upgrade to 9.4.1 =================== Unofficial ArchLinux Security Bug Tracker: http://jjdanimoth.netsons.org/alsw.html Reference(s) =================== http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2241
signature.asc
Description: OpenPGP digital signature
_______________________________________________ arch mailing list [email protected] http://archlinux.org/mailman/listinfo/arch
