----- Original Message ----- From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Minggu, 12 Nopember 2000 15:21 Subject: Unidentified subject! > -----BEGIN PGP SIGNED MESSAGE----- > > - ------------------------------------------------------------------------ ---- > Debian Security Advisory [EMAIL PROTECTED] > http://www.debian.org/security/ Daniel Jacobowitz > November 12, 2000 > - ------------------------------------------------------------------------ ---- > > Package: bind > Vulnerability: remote Denial of Service > Debian-specific: no > Vulnerable: yes > > The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable to > a remote denial of service attack, which can cause the nameserver to crash > after accessing an uninitialized pointer. This problem is fixed in the current > maintenance release of BIND, 8.2.2P7, and in the Debian package version > 8.2.2p7-1 for both stable and unstable releases. > > We recommend that all users of bind upgrade immediately. > > Debian GNU/Linux 2.1 alias slink > - -------------------------------- > > Slink is no longer being supported by the Debian Security Team. We highly > recommend an upgrade to the current stable release. > > Debian GNU/Linux 2.2 (stable) alias potato > - ------------------------------------------ > > Fixes are currently available for the Alpha, ARM, Intel ia32, Motorola 680x0, > PowerPC and Sun SPARC architectures, and will be included in 2.2r2. > > Source archives: > http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7-1.d iff.gz > MD5 checksum: 9cde4283e855aa1bf467839af6eb32b5 > http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7-1.d sc > MD5 checksum: 7b082b218f267938627bf1657502deb0 > http://security.debian.org/dists/potato/updates/main/source/bind_8.2.2p7.ori g.tar.gz > MD5 checksum: a37996a13eca6667392d575611d48d10 > > Alpha architecture: > http://security.debian.org/dists/potato/updates/main/binary-alpha/bind-dev_8 .2.2p7-1_alpha.deb > MD5 checksum: 2315ecbe3d12e3b63990d3c3865757c7 > http://security.debian.org/dists/potato/updates/main/binary-alpha/bind_8.2.2 p7-1_alpha.deb > MD5 checksum: 714123acb9343215f1db7069a852097b > http://security.debian.org/dists/potato/updates/main/binary-alpha/dnsutils_8 .2.2p7-1_alpha.deb > MD5 checksum: 52674605ace1f92dace748d2f395a25e > > ARM architecture: > http://security.debian.org/dists/potato/updates/main/binary-arm/bind-dev_8.2 .2p7-1_arm.deb > MD5 checksum: ee34a99274fb5c39d7827022f97f90cd > http://security.debian.org/dists/potato/updates/main/binary-arm/bind_8.2.2p7 -1_arm.deb > MD5 checksum: 479bc6ee1ec7420dd66492ee86a0b4f2 > http://security.debian.org/dists/potato/updates/main/binary-arm/dnsutils_8.2 .2p7-1_arm.deb > MD5 checksum: 9f2993e930fe124b7d781f7fcf7dd9f5 > > Intel ia32 architecture: > http://security.debian.org/dists/potato/updates/main/binary-i386/bind-dev_8. 2.2p7-1_i386.deb > MD5 checksum: 513489234a54cf0ec315614ad4d3eb6c > http://security.debian.org/dists/potato/updates/main/binary-i386/bind_8.2.2p 7-1_i386.deb > MD5 checksum: e43bcbf9ea61557df87a96d3554d4a51 > http://security.debian.org/dists/potato/updates/main/binary-i386/dnsutils_8. 2.2p7-1_i386.deb > MD5 checksum: bda3b5b518413f158b7e22c86bcd256e > > Motorola 680x0 architecture: > http://security.debian.org/dists/potato/updates/main/binary-m68k/bind-dev_8. 2.2p7-1_m68k.deb > MD5 checksum: fa8e79eb6df63bdb61571e0de4fd104d > http://security.debian.org/dists/potato/updates/main/binary-m68k/bind_8.2.2p 7-1_m68k.deb > MD5 checksum: a20d3db55060efffe2751d06d73d2e3b > http://security.debian.org/dists/potato/updates/main/binary-m68k/dnsutils_8. 2.2p7-1_m68k.deb > MD5 checksum: e882f568805162ded8d96d88a69f6bdb > > PowerPC architecture: > http://security.debian.org/dists/potato/updates/main/binary-powerpc/bind-dev _8.2.2p7-1_powerpc.deb > MD5 checksum: 7224113410d6c8d35facbb8a017c612b > http://security.debian.org/dists/potato/updates/main/binary-powerpc/bind_8.2 .2p7-1_powerpc.deb > MD5 checksum: 8cad0e6aedcbbd73d6341dcc7dda23f9 > http://security.debian.org/dists/potato/updates/main/binary-powerpc/dnsutils _8.2.2p7-1_powerpc.deb > MD5 checksum: c25d9943a4a508eb80e6e9d1c564eb29 > > Sun Sparc architecture: > http://security.debian.org/dists/potato/updates/main/binary-sparc/bind-dev_8 .2.2p7-1_sparc.deb > MD5 checksum: 022fe932c1b25fb6d59d5031de8a04ba > http://security.debian.org/dists/potato/updates/main/binary-sparc/bind_8.2.2 p7-1_sparc.deb > MD5 checksum: b7c02ca550277dce564375ff28ef0f2a > http://security.debian.org/dists/potato/updates/main/binary-sparc/dnsutils_8 .2.2p7-1_sparc.deb > MD5 checksum: c98c594c4846ff7a639a020e42ae7462 > > Debian GNU/Linux Unstable alias woody > - ------------------------------------- > > This version of Debian is not yet released. > > Fixes will be available for Alpha, ARM, Intel ia32, Motorola 680x0, > PowerPC, and SPARC in the Debian archive tomorrow. The fixed packages > listed above may also be installed on unstable systems. > > - ------------------------------------------------------------------------ ---- > For apt-get: deb http://security.debian.org/ stable/updates main > Mailing list: [EMAIL PROTECTED] > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3a > Charset: noconv > > iQCVAwUBOg5SnD5fjwqn/34JAQHnLAP/afv4E/t7uIj5vs47vC4pYvpKEb6EvFyU > Way4VI7HFwNbPlGKcSIE70Gg5e2U+QWNjaibfEK7FCXWpGWfuL5yzk8x6cuUHvLc > EGFhdDVh5N+dY7oDk1mYpUWH4PCrAg4W6Hi9fPaOLAGgC5pUQJZ3/EUPuH8TMzhQ > q4m7D5tSes8= > =hwcX > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
