| From: |
| Pat Riehecky <riehecky@fnal.gov> |
| To: |
| <scientific-linux-errata@listserv.fnal.gov> |
| Subject: |
| Security ERRATA Important: bind97 on SL5.x i386/x86_64 |
| Date: |
| Fri, 29 Mar 2013 14:13:57 +0000 |
| Message-ID: |
| <20130329141357.25032.21810@slpackages.fnal.gov> |
| Archive-link: |
| Article, Thread
|
Synopsis: Important: bind97 security update
Issue Date: 2013-03-28
CVE Numbers: CVE-2013-2266
--
A denial of service flaw was found in the libdns library. A remote
attacker could use this flaw to send a specially-crafted DNS query to
named that, when processed, would cause named to use an excessive amount
of memory, or possibly crash. (CVE-2013-2266)
Note: This update disables the syntax checking of NAPTR (Naming Authority
Pointer) resource records.
After installing the update, the BIND daemon (named) will be restarted
automatically.
--
SL5
x86_64
bind97-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-chroot-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-utils-9.7.0-17.P2.el5_9.1.x86_64.rpm
i386
bind97-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-chroot-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-utils-9.7.0-17.P2.el5_9.1.i386.rpm
- Scientific Linux Development Team
(
Log in to post comments)