Re: BIND vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



RedShift napsal(a):> According to a commenter, this should provide a temporary countermeasure:> > iptables -A INPUT -p udp --dport 53 -j DROP -m u32 --u32 '30>>27&0xF=5'> > Haven't tested it, would like to know the results...> 
Well, good point, but Centos does not ship libipt_u32.so. Even moreCentos 4.x is now undergoing rebuild process, so no updates evensecurity updates are being released. Which is something I can accept.
Those looking for patched bind for Centos 4.x may use packages I havebuilt with CVE-2009-0696 patch.http://fs12.vsb.cz/hrb33/el4/hrb/testing/i386/repoview/letter_b.group.htmlhttp://fs12.vsb.cz/hrb33/el4/hrb/testing/x86_64/repoview/letter_b.group.html
Regards,David Hrbáč








_______________________________________________CentOS mailing listCentOS@xxxxxxxxxxxxxx://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux