Date: Mon, 29 Jan 2001 18:08:28 +0100
From: Martin Schulze firstname.lastname@example.org
To: Debian Security Announcements
Subject: [SECURITY] [DSA 026-1] New version of BIND 8 released
Package : bind
Vulnerability : buffer overflows and information leak
BIND 8 suffered from several buffer overflows. It is possible to
construct an inverse query that allows the stack to be read
remotely exposing environment variables. CERT has disclosed
information about these issues. A new upstream version fixes this.
Due to the complexity of BIND we have decided to make an exception
to our rule by releasin the new upstream source to our stable
We recommend you upgrade your bind packages immediately.
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.