User: Password:
|
|
Subscribe / Log in / New account

Scientific Linux alert SL-bind-20130329 (bind97)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Important: bind97 on SL5.x i386/x86_64
Date:  Fri, 29 Mar 2013 14:13:57 +0000
Message-ID:  <20130329141357.25032.21810@slpackages.fnal.gov>
Archive-link:  Article, Thread

Synopsis: Important: bind97 security update Issue Date: 2013-03-28 CVE Numbers: CVE-2013-2266 -- A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. (CVE-2013-2266) Note: This update disables the syntax checking of NAPTR (Naming Authority Pointer) resource records. After installing the update, the BIND daemon (named) will be restarted automatically. -- SL5 x86_64 bind97-9.7.0-17.P2.el5_9.1.x86_64.rpm bind97-chroot-9.7.0-17.P2.el5_9.1.x86_64.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.1.x86_64.rpm bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm bind97-devel-9.7.0-17.P2.el5_9.1.x86_64.rpm bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm bind97-libs-9.7.0-17.P2.el5_9.1.x86_64.rpm bind97-utils-9.7.0-17.P2.el5_9.1.x86_64.rpm i386 bind97-9.7.0-17.P2.el5_9.1.i386.rpm bind97-chroot-9.7.0-17.P2.el5_9.1.i386.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm bind97-utils-9.7.0-17.P2.el5_9.1.i386.rpm - Scientific Linux Development Team


(Log in to post comments)


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds