Vulnerability: remote Denial of Service
The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable
to a remote denial of service attack, which can cause the
nameserver to crash after accessing an uninitialized pointer. This
problem is fixed in the current maintenance release of BIND,
8.2.2P7, and in the Debian package version 8.2.2p7-1 for both
stable and unstable releases.
We recommend that all users of bind upgrade immediately.
Debian GNU/Linux 2.1 alias slink
Slink is no longer being supported by the Debian Security Team.
We highly recommend an upgrade to the current stable release.
Debian GNU/Linux 2.2 (stable) alias potato
Fixes are currently available for the Alpha, ARM, Intel ia32,
Motorola 680x0, PowerPC and Sun SPARC architectures, and will be
included in 2.2r2.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.