Synopsis:          Important: bind97 security update
Advisory ID:       SLSA-2015:1707-1
Issue Date:        2015-09-03
CVE Numbers:       CVE-2015-5722
--

A denial of service flaw was found in the way BIND parsed certain
malformed DNSSEC keys. A remote attacker could use this flaw to send a
specially crafted DNS query (for example, a query requiring a response
from a zone containing a deliberately malformed key) that would cause
named functioning as a validating resolver to crash. (CVE-2015-5722)

After installing the update, the BIND daemon (named) will be restarted
automatically.
--

SL5
  x86_64
    bind97-9.7.0-21.P2.el5_11.3.x86_64.rpm
    bind97-chroot-9.7.0-21.P2.el5_11.3.x86_64.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.3.x86_64.rpm
    bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-devel-9.7.0-21.P2.el5_11.3.x86_64.rpm
    bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-libs-9.7.0-21.P2.el5_11.3.x86_64.rpm
    bind97-utils-9.7.0-21.P2.el5_11.3.x86_64.rpm
  i386
    bind97-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-chroot-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm
    bind97-utils-9.7.0-21.P2.el5_11.3.i386.rpm

- Scientific Linux Development Team