Am 17.02.2016 um 17:22 schrieb Dominique Jullier:
Are they any thoughts around, how to handle yesterday's glibc
vulnerability[1][2] from the side bind?

Since it is a rather painful task in order to update all hosts to a new
version of glibc, we were thinking about other possible workarounds

Fedora, RHEL and Debian as well as likely all other relevant distributions are providing a patched glibc - dunno what is "rather painful" to apply a ordinary update like kernel security updates and restart all network relevant processes or reboot

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to