---------------------------------------------------------------------------- Debian Security Advisory DSA-026-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 29, 2001 ----------------------------------------------------------------------------
Package : bind Vulnerability : buffer overflows and information leak Debian-specific: no
BIND 8 suffered from several buffer overflows. It is possible to construct an inverse query that allows the stack to be read remotely exposing environment variables. CERT has disclosed information about these issues. A new upstream version fixes this. Due to the complexity of BIND we have decided to make an exception to our rule by releasin the new upstream source to our stable distribution.
We recommend you upgrade your bind packages immediately.
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato ------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc architectures.