rPath Security Advisory: 2008-0231-1
rPath Linux 2
Exposure Level Classification:
Remote System User Deterministic Weakness
rPath Issue Tracking System:
Previous versions of the bind package are vulnerable to a
cache-poisoning attack due to a weakness in the DNS protocol.
This update improves bind's resilience to this attack; however,
it does not provide a definitive solution.
Additionally, the bind package has been updated with root
nameserver information, including the new IP address for
the "L" root nameserver.
Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html