| From: |
| Pat Riehecky <riehecky@fnal.gov> |
| To: |
| <scientific-linux-errata@listserv.fnal.gov> |
| Subject: |
| Security ERRATA Important: bind97 on SL5.x i386/x86_64 |
| Date: |
| Tue, 30 Jul 2013 14:04:46 +0000 |
| Message-ID: |
| <20130730140446.11791.5180@slpackages.fnal.gov> |
| Archive-link: |
| Article, Thread
|
Synopsis: Important: bind97 security update
Advisory ID: SLSA-2013:1115-1
Issue Date: 2013-07-30
CVE Numbers: CVE-2013-4854
--
A denial of service flaw was found in BIND. A remote attacker could use
this flaw to send a specially-crafted DNS query to named that, when
processed, would cause named to crash when rejecting the malformed query.
(CVE-2013-4854)
After installing the update, the BIND daemon (named) will be restarted
automatically.
--
SL5
x86_64
bind97-9.7.0-17.P2.el5_9.2.x86_64.rpm
bind97-chroot-9.7.0-17.P2.el5_9.2.x86_64.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.2.x86_64.rpm
bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.2.x86_64.rpm
bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.2.x86_64.rpm
bind97-utils-9.7.0-17.P2.el5_9.2.x86_64.rpm
i386
bind97-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-chroot-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm
bind97-utils-9.7.0-17.P2.el5_9.2.i386.rpm
- Scientific Linux Development Team
(
Log in to post comments)