[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-security] Glibc Security Update 2.0.1



Thanks, Eddy. I'd obviously be in big trouble without help from
list members like you. My question was based on having read
"maximum buffer size... when processing a DNS response" in
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1146

Thanks again ~

:D


----- Original Message ----- 
From: "E.B. Dreger" <eddy+public+spam@xxxxxxxxxxxxxxxxx>
To: <cobalt-security@xxxxxxxxxxxxxxx>
Sent: Friday, April 25, 2003 10:25 AM
Subject: Re: [cobalt-security] Glibc Security Update 2.0.1


> DB> Date: Thu, 24 Apr 2003 22:11:59 -0500
> DB> From: David Black
> 
> 
> DB> Do I even need to install this update,
> DB> if I use my provider's DNS servers?
> 
> You might wish to review the function of glibc. :-)  It's used by
> virtually all programs... yes, glibc updates are important.
> 
> 
> Eddy
> --
> Brotsman & Dreger, Inc. - EverQuick Internet Division
> Bandwidth, consulting, e-commerce, hosting, and network building
> Phone: +1 (785) 865-5885 Lawrence and [inter]national
> Phone: +1 (316) 794-8922 Wichita
> 
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
> From: A Trap <blacklist@xxxxxxxxx>
> To: blacklist@xxxxxxxxx
> Subject: Please ignore this portion of my mail signature.
> 
> These last few lines are a trap for address-harvesting spambots.
> Do NOT send mail to <blacklist@xxxxxxxxx>, or you are likely to
> be blocked.
> 
> _______________________________________________
> cobalt-security mailing list
> cobalt-security@xxxxxxxxxxxxxxx
> http://list.cobalt.com/mailman/listinfo/cobalt-security
>