Synopsis: Important: bind security update Issue Date: 2011-11-29 CVE Numbers: CVE-2011-4313 The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS queries, which caused it to cache an invalid record. A remote attacker could use this flaw to send repeated queries for this invalid record, causing the resolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313) Users of bind are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically. SL4: i386 bind-9.2.4-38.el4.i386.rpm bind-chroot-9.2.4-38.el4.i386.rpm bind-debuginfo-9.2.4-38.el4.i386.rpm bind-devel-9.2.4-38.el4.i386.rpm bind-libs-9.2.4-38.el4.i386.rpm bind-utils-9.2.4-38.el4.i386.rpm x86_64 bind-9.2.4-38.el4.x86_64.rpm bind-chroot-9.2.4-38.el4.x86_64.rpm bind-debuginfo-9.2.4-38.el4.i386.rpm bind-debuginfo-9.2.4-38.el4.x86_64.rpm bind-devel-9.2.4-38.el4.x86_64.rpm bind-libs-9.2.4-38.el4.i386.rpm bind-libs-9.2.4-38.el4.x86_64.rpm bind-utils-9.2.4-38.el4.x86_64.rpm - Scientific Linux Development Team