on 7-10-2008 5:16 AM Sergio Belkin spake the following: > 2008/7/9 Scott Silva <ssilva at sgvwater.com>: >> on 7-9-2008 1:08 PM John R Pierce spake the following: >>> Sean Carolan wrote: >>>> Will there be a BIND patch available for this vulnerability, for CentOS >>>> 3.9? >>>> >>>> http://www.kb.cert.org/vuls/id/800113 >>>> >>> for that matter, how do I figure out what version(s) of Bind for CentOS 4 >>> or 5 include fixes for this? I'm getting a little lost poking around the >>> forums and KB and RHEL's own website is being remarkably obtuse for me >>> today. >> This will test your server for the vulnerability; >> >> dig +short porttest.dns-oarc.net TXT >> >> >> -- >> MailScanner is like deodorant... >> You hope everybody uses it, and >> you notice quickly if they don't!!!! >> >> >> _______________________________________________ >> CentOS mailing list >> CentOS at centos.org >> http://lists.centos.org/mailman/listinfo/centos >> >> > > Has anyone applied updates to bind in Centos 5.x? I'd want to know if > after that everything will be working well... > I have patched all my name servers. The only one I am having a problem with is an upstream reverse dns problem. But that was broken before the update. -- MailScanner is like deodorant... You hope everybody uses it, and you notice quickly if they don't!!!! -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 258 bytes Desc: OpenPGP digital signature URL: <http://lists.centos.org/pipermail/centos/attachments/20080710/31f62d6d/attachment-0005.sig>