07/03/2012 01:16 AM, Oscar Ricardo Silva wrote:
>> I *THINK* I found the reason for why we're exposed to this bug ...
>> It would appear that Redhat based their BIND package on 9.8.2rc1.
>> Guess where the patch for this bug was applied?  9.8.2rc2.

> Are you sure about this?

> From what I can see in our local yum repo of the RHEL6 ISOs, it
> shipped with bind 9.7.

> Sure that isn't a local package, or you're joined into a
> non-production channel?


Nope, not 100% sure of this but I strongly suspect this is the case. We recently had to update the BIND package on RHEL6 to address this vulnerability:

CVE-2012-1667
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1667


and in the process of upgrading, were given bind-9.8.2-0.10.rc1.el6:32.i686. It was while looking at the source for that package (bind-9.8.2-0.10.rc1.el6.src.rpm) that I found the file bind-9.8.2rc1.tar.gz



According to the changelog on that package, they changed the numbering from 9.7 to 9.8 starting in February of this year:

******************************
2012-02-15 12:00:00
.... 32:9.8.2-0.3.rc1:


2011-12-20 12:00:00
.... 32:9.7.3-10.P3:
******************************



Oscar


Oscar
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to