SCIENTIFIC-LINUX-ERRATA Archives

July 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 29 Jul 2015 15:17:30 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (37 lines)
Synopsis:          Important: bind97 security update
Advisory ID:       SLSA-2015:1515-1
Issue Date:        2015-07-29
CVE Numbers:       CVE-2015-5477
--

A flaw was found in the way BIND handled requests for TKEY DNS resource
records. A remote attacker could use this flaw to make named (functioning
as an authoritative DNS server or a DNS resolver) exit unexpectedly with
an assertion failure via a specially crafted DNS request packet.
(CVE-2015-5477)

After installing the update, the BIND daemon (named) will be restarted
automatically.
--

SL5
  x86_64
    bind97-9.7.0-21.P2.el5_11.2.x86_64.rpm
    bind97-chroot-9.7.0-21.P2.el5_11.2.x86_64.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.2.x86_64.rpm
    bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-devel-9.7.0-21.P2.el5_11.2.x86_64.rpm
    bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-libs-9.7.0-21.P2.el5_11.2.x86_64.rpm
    bind97-utils-9.7.0-21.P2.el5_11.2.x86_64.rpm
  i386
    bind97-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-chroot-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    bind97-utils-9.7.0-21.P2.el5_11.2.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2