Hello. I think Centos are affected, right? Some update from Centos?
On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote:> Hello. > > I think Centos are affected, right? > > Some update from Centos? > _______________________________________________ > CentOS mailing list > CentOS at centos.org > https://lists.centos.org/mailman/listinfo/centos >Sure looks that way... https://access.redhat.com/security/cve/cve-2016-1285 https://access.redhat.com/security/cve/cve-2016-1286
On 03/10/2016 07:13 AM, Michael H wrote:> On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote: >> Hello. >> >> I think Centos are affected, right? >> >> Some update from Centos? >> _______________________________________________ >> CentOS mailing list >> CentOS at centos.org >> https://lists.centos.org/mailman/listinfo/centos >> > > Sure looks that way... > > https://access.redhat.com/security/cve/cve-2016-1285 > https://access.redhat.com/security/cve/cve-2016-1286 > >I don't think NSD is impacted, which is what I use for authoritative nameserver. There's an EPEL package. NSD is authoritative only, which is why I use it. No clue about unbound.
On 03/10/2016 08:47 AM, Leonardo Oliveira Ortiz wrote:> Hello. > > I think Centos are affected, right? > > Some update from Centos? > _______________________________________________ > CentOS mailing list > CentOS at centos.org > https://lists.centos.org/mailman/listinfo/centos >If / When Red Hat releases any software related to these CVEs, that source code will be rebuilt and released, then announced. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 198 bytes Desc: OpenPGP digital signature URL: <http://lists.centos.org/pipermail/centos/attachments/20160314/6d75ddc3/attachment-0001.sig>