----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Minggu, 12 Nopember 2000 15:21
Subject: Unidentified subject!


> -----BEGIN PGP SIGNED MESSAGE-----
>
> - ------------------------------------------------------------------------
----
> Debian Security Advisory
[EMAIL PROTECTED]
> http://www.debian.org/security/                            Daniel
Jacobowitz
> November 12, 2000
> - ------------------------------------------------------------------------
----
>
> Package: bind
> Vulnerability: remote Denial of Service
> Debian-specific: no
> Vulnerable: yes
>
> The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable to
> a remote denial of service attack, which can cause the nameserver to crash
> after accessing an uninitialized pointer.  This problem is fixed in the
current
> maintenance release of BIND, 8.2.2P7, and in the Debian package version
> 8.2.2p7-1 for both stable and unstable releases.
>
> We recommend that all users of bind upgrade immediately.
>
> Debian GNU/Linux 2.1 alias slink
> - --------------------------------
>
>   Slink is no longer being supported by the Debian Security Team.  We
highly
>   recommend an upgrade to the current stable release.
>
> Debian GNU/Linux 2.2 (stable) alias potato
> - ------------------------------------------
>
>   Fixes are currently available for the Alpha, ARM, Intel ia32, Motorola
680x0,
>   PowerPC and Sun SPARC architectures, and will be included in 2.2r2.
>
>   Source archives:
>
http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7-1.d
iff.gz
>       MD5 checksum: 9cde4283e855aa1bf467839af6eb32b5
>
http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7-1.d
sc
>       MD5 checksum: 7b082b218f267938627bf1657502deb0
>
http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7.ori
g.tar.gz
>       MD5 checksum: a37996a13eca6667392d575611d48d10
>
>   Alpha architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-alpha/bind-dev_8
.2.2p7-1_alpha.deb
>       MD5 checksum: 2315ecbe3d12e3b63990d3c3865757c7
>
http://security.debian.org/dists/potato/updates/main/binary-alpha/bind_8.2.2
p7-1_alpha.deb
>       MD5 checksum: 714123acb9343215f1db7069a852097b
>
http://security.debian.org/dists/potato/updates/main/binary-alpha/dnsutils_8
.2.2p7-1_alpha.deb
>       MD5 checksum: 52674605ace1f92dace748d2f395a25e
>
>   ARM architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-arm/bind-dev_8.2
.2p7-1_arm.deb
>       MD5 checksum: ee34a99274fb5c39d7827022f97f90cd
>
http://security.debian.org/dists/potato/updates/main/binary-arm/bind_8.2.2p7
-1_arm.deb
>       MD5 checksum: 479bc6ee1ec7420dd66492ee86a0b4f2
>
http://security.debian.org/dists/potato/updates/main/binary-arm/dnsutils_8.2
.2p7-1_arm.deb
>       MD5 checksum: 9f2993e930fe124b7d781f7fcf7dd9f5
>
>   Intel ia32 architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-i386/bind-dev_8.
2.2p7-1_i386.deb
>       MD5 checksum: 513489234a54cf0ec315614ad4d3eb6c
>
http://security.debian.org/dists/potato/updates/main/binary-i386/bind_8.2.2p
7-1_i386.deb
>       MD5 checksum: e43bcbf9ea61557df87a96d3554d4a51
>
http://security.debian.org/dists/potato/updates/main/binary-i386/dnsutils_8.
2.2p7-1_i386.deb
>       MD5 checksum: bda3b5b518413f158b7e22c86bcd256e
>
>   Motorola 680x0 architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-m68k/bind-dev_8.
2.2p7-1_m68k.deb
>       MD5 checksum: fa8e79eb6df63bdb61571e0de4fd104d
>
http://security.debian.org/dists/potato/updates/main/binary-m68k/bind_8.2.2p
7-1_m68k.deb
>       MD5 checksum: a20d3db55060efffe2751d06d73d2e3b
>
http://security.debian.org/dists/potato/updates/main/binary-m68k/dnsutils_8.
2.2p7-1_m68k.deb
>       MD5 checksum: e882f568805162ded8d96d88a69f6bdb
>
>   PowerPC architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-powerpc/bind-dev
_8.2.2p7-1_powerpc.deb
>       MD5 checksum: 7224113410d6c8d35facbb8a017c612b
>
http://security.debian.org/dists/potato/updates/main/binary-powerpc/bind_8.2
.2p7-1_powerpc.deb
>       MD5 checksum: 8cad0e6aedcbbd73d6341dcc7dda23f9
>
http://security.debian.org/dists/potato/updates/main/binary-powerpc/dnsutils
_8.2.2p7-1_powerpc.deb
>       MD5 checksum: c25d9943a4a508eb80e6e9d1c564eb29
>
>   Sun Sparc architecture:
>
http://security.debian.org/dists/potato/updates/main/binary-sparc/bind-dev_8
.2.2p7-1_sparc.deb
>       MD5 checksum: 022fe932c1b25fb6d59d5031de8a04ba
>
http://security.debian.org/dists/potato/updates/main/binary-sparc/bind_8.2.2
p7-1_sparc.deb
>       MD5 checksum: b7c02ca550277dce564375ff28ef0f2a
>
http://security.debian.org/dists/potato/updates/main/binary-sparc/dnsutils_8
.2.2p7-1_sparc.deb
>       MD5 checksum: c98c594c4846ff7a639a020e42ae7462
>
> Debian GNU/Linux Unstable alias woody
> - -------------------------------------
>
>   This version of Debian is not yet released.
>
>   Fixes will be available for Alpha, ARM, Intel ia32, Motorola 680x0,
>   PowerPC, and SPARC in the Debian archive tomorrow.  The fixed packages
>   listed above may also be installed on unstable systems.
>
> - ------------------------------------------------------------------------
----
> For apt-get: deb http://security.debian.org/ stable/updates main
> Mailing list: [EMAIL PROTECTED]
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a
> Charset: noconv
>
> iQCVAwUBOg5SnD5fjwqn/34JAQHnLAP/afv4E/t7uIj5vs47vC4pYvpKEb6EvFyU
> Way4VI7HFwNbPlGKcSIE70Gg5e2U+QWNjaibfEK7FCXWpGWfuL5yzk8x6cuUHvLc
> EGFhdDVh5N+dY7oDk1mYpUWH4PCrAg4W6Hi9fPaOLAGgC5pUQJZ3/EUPuH8TMzhQ
> q4m7D5tSes8=
> =hwcX
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>


--------------------------------------------------------------------------
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3
Pengelola dapat dihubungi lewat [EMAIL PROTECTED]


Kirim email ke