A vulnerability exists with the bind nameserver dealing with
compressed zone transfers. This vulnerability can be exploited by
authorized zone transfers and used in a DoS attack. The named
daemon will crash if it receives this type of zone transfer from an
authorized source address. The crash is not necessarily immediate,
but can range from a few seconds to a few minutes from the time of
This new version of bind also fixes a bug in the handling of the
compression pointer tables which can result in the nameserver
entering an infinite loop. This bug has been known to occur in the
standard processing of SRV records used with Windows 2000 Active
All Linux-Mandrake users are encouraged to upgrade bind
Please verify these md5 checksums of the updates prior to
upgrading to ensure the integrity of the downloaded package. You
can do this by running the md5sum program on the downloaded package
by using "md5sum package.rpm".
Updated packages are available in the "updates/[ver]/RPMS/"
directory. For example, if you are looking for an updated RPM
package for Linux-Mandrake 7.1, look for it in "updates/7.1/RPMS/".
Updated source RPMs are available as well, but you generally do not
need to download them.
Please be aware that sometimes it takes the mirrors a few hours
to update, so if you want an immediate upgrade, please use one of
the two above-listed mirrors.
You can view other security advisories for Linux-Mandrake
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.