Synopsis: Important: bind security update Issue Date: 2012-09-14 CVE Numbers: CVE-2012-4244 The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled resource records with a large RDATA value. A malicious owner of a DNS domain could use this flaw to create specially-crafted DNS resource records, that would cause a recursive resolver or secondary server to exit unexpectedly with an assertion failure. (CVE-2012-4244) Users of bind are advised to upgrade to these updated packages, which correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically. SL6 x86_64 bind-libs-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-libs-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm bind-utils-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm bind-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm bind-chroot-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm bind-devel-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-devel-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm bind-sdb-9.8.2-0.10.rc1.el6_3.3.x86_64.rpm i386 bind-libs-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-utils-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-chroot-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-devel-9.8.2-0.10.rc1.el6_3.3.i686.rpm bind-sdb-9.8.2-0.10.rc1.el6_3.3.i686.rpm - Scientific Linux Development Team