Synopsis: Important: bind97 security update Issue Date: 2011-11-17 CVE Numbers: CVE-2011-4313 The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS queries, which caused it to cache an invalid record. A remote attacker could use this flaw to send repeated queries for this invalid record, causing the resolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313) Users of bind97 are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically. SL5: i386 bind97-9.7.0-6.P2.el5_7.4.i386.rpm bind97-chroot-9.7.0-6.P2.el5_7.4.i386.rpm bind97-debuginfo-9.7.0-6.P2.el5_7.4.i386.rpm bind97-devel-9.7.0-6.P2.el5_7.4.i386.rpm bind97-libs-9.7.0-6.P2.el5_7.4.i386.rpm bind97-utils-9.7.0-6.P2.el5_7.4.i386.rpm x86_64 bind97-9.7.0-6.P2.el5_7.4.x86_64.rpm bind97-chroot-9.7.0-6.P2.el5_7.4.x86_64.rpm bind97-debuginfo-9.7.0-6.P2.el5_7.4.i386.rpm bind97-debuginfo-9.7.0-6.P2.el5_7.4.x86_64.rpm bind97-devel-9.7.0-6.P2.el5_7.4.i386.rpm bind97-devel-9.7.0-6.P2.el5_7.4.x86_64.rpm bind97-libs-9.7.0-6.P2.el5_7.4.i386.rpm bind97-libs-9.7.0-6.P2.el5_7.4.x86_64.rpm bind97-utils-9.7.0-6.P2.el5_7.4.x86_64.rpm - Scientific Linux Development Team