Synopsis: Important: bind security update Issue Date: 2012-12-06 CVE Numbers: CVE-2012-5688 -- A flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially-crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688) After installing the update, the BIND daemon (named) will be restarted automatically. -- SL6 x86_64 bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-libs-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-utils-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-chroot-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-devel-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm bind-sdb-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm i386 bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-utils-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-chroot-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm bind-sdb-9.8.2-0.10.rc1.el6_3.6.i686.rpm - Scientific Linux Development Team