Bug 11876 - named-xfer bug in bind 8.2.2-P3 ?
Summary: named-xfer bug in bind 8.2.2-P3 ?
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: bind   
(Show other bugs)
Version: 6.1
Hardware: i386
OS: Linux
Target Milestone: ---
Assignee: Bernhard Rosenkraenzer
QA Contact:
URL: http://www.isc.org/products/BIND/
Depends On:
TreeView+ depends on / blocked
Reported: 2000-06-02 23:05 UTC by Christian Rose
Modified: 2008-05-01 15:37 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-06-26 19:34:43 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Christian Rose 2000-06-02 23:05:26 UTC
I quote directly from the BIND homepage (the URL above):
"If you are running a version of BIND prior to 8.2.2 patchlevel 3, we
recommend you upgrade to the current version for security reasons. If you
are running BIND 8.2.2-P3, and compiled it yourself, we recommend you
upgrade to 8.2.2-P5 to correct a named-xfer problem. <B>If your
vendor-provided BIND is 8.2.2-P3, you should consult their documentation
and confirm that the named-xfer bug has been patched.</B>"<BR>
(emphasis mine)
As the most recent packages for Red Hat 6.1 (and possibly older releases
too) are 8.2.2-P3, I question if this has been fixed.
Another quote from http://www.sans.org/topten.htm discussing various
security vulnerabilities in bind:
"As of May 22, 2000, any version earlier than BIND v.8.2.2 patch level 5 is
Maybe time for new bind packages for older versions of Red Hat?

Comment 1 Bernhard Rosenkraenzer 2000-06-26 19:34:41 UTC
They got the wrong release number - 8.2.2p3 is not affected.
Actually the P3 package we're shipping has almost all patches that made it into

Comment 2 Christian Rose 2000-08-27 17:30:17 UTC
Closing old resolved bugs.

Note You need to log in before you can comment on or make changes to this bug.