[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 3481-1] glibc security update



On 2016-02-17 23:43, Dominic Hargreaves wrote:
The answer here implies that just any resolver will not help you,
but that there is an unbound configuration that might:

https://lists.dns-oarc.net/pipermail/dns-operations/2016-February/014349.html
Yeah, I also followed some discussions on PowerDNS [1] and Bind [2] mailing lists/blogs. As it is still not quite clear yet, how this issue is exploitable, the general consensus is
it might be possible that resolvers relay exploit content to clients.

So to be on the safe side, patching and rebooting or at least restarting prominent services
is the way to got.

Cheers,
Tom.

[1] http://blog.powerdns.com/2016/02/17/powerdns-cve-2015-7547-possible-mitigation/
[2] https://lists.isc.org/pipermail/bind-users/2016-February/096297.html


Reply to: