Synopsis:          Important: bind security update
Issue Date:        2012-12-06
CVE Numbers:       CVE-2012-5688
--

A flaw was found in the DNS64 implementation in BIND. If a remote 
attacker sent
a specially-crafted query to a named server, named could exit 
unexpectedly with
an assertion failure. Note that DNS64 support is not enabled by default.
(CVE-2012-5688)

After installing the update, the BIND daemon (named) will be restarted
automatically.
--

SL6
   x86_64
     bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-libs-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-utils-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-chroot-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-devel-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
     bind-sdb-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
   i386
     bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-utils-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-chroot-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm
     bind-sdb-9.8.2-0.10.rc1.el6_3.6.i686.rpm

- Scientific Linux Development Team