Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20020629192402.A966@openwall.com>
Date: Sat, 29 Jun 2002 19:24:02 +0400
From: Solar Designer <solar@...nwall.com>
To: announce@...ts.openwall.com
Cc: lwn@....net
Subject: BIND 4.9.8-OW2 and 4.9.9-OW1 released

Hi,

Joost Pol of PINE-CERT has discovered a vulnerability in the resolver
library code used on *BSD (as well as on a number of other systems,
including those based around the GNU C library prior to version
2.1.3) and included with BIND.  The vulnerability affects applications
and BIND tools that use the vulnerable library code.  The BIND DNS
server itself (named) is unaffected.  You may refer to the CERT
advisory for more information:

	http://www.cert.org/advisories/CA-2002-19.html

The BIND 4.9.8-OW2 patch and BIND 4.9.9 release (and thus 4.9.9-OW1)
include fixes for this vulnerability, originally developed by
Jun-ichiro itojun Hagino of NetBSD.  The updated patches are available
at the usual place:

	http://www.openwall.com/bind/

Note that in order to make use of the fixes you need to rebuild all
applications that are statically linked against and make use of the
BIND-provided resolver routines.

No release or branch of Openwall GNU/*/Linux (Owl) is known to be
affected, due to Olaf Kirch's fixes for this problem getting into the
GNU C library more than two years ago.

-- 
/sd

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.