Hello all,

Are they any thoughts around, how to handle yesterday's glibc
vulnerability[1][2] from the side bind? 

Since it is a rather painful task in order to update all hosts to a new
version of glibc, we were thinking about other possible workarounds.

Any ideas how to drop non-compliant responses in bind? I.e. with an
extension/adaptation of bind?

[1]https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
[2]
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to