Synopsis: Important: bind97 security update Advisory ID: SLSA-2015:1707-1 Issue Date: 2015-09-03 CVE Numbers: CVE-2015-5722 -- A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) After installing the update, the BIND daemon (named) will be restarted automatically. -- SL5 x86_64 bind97-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.3.x86_64.rpm i386 bind97-9.7.0-21.P2.el5_11.3.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.3.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.3.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.3.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.3.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.3.i386.rpm - Scientific Linux Development Team