Red Hat, Inc. Information for VU#800113
Multiple DNS implementations vulnerable to cache poisoning
Updated BIND packages which implement UDP source randomization have
been made available for Red Hat Enterprise Linux 2.1, 3, 4, and 5:
We are not aware of further vendor information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.