[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Scientific Linux alert SL-bind-20130730 (bind97)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Important: bind97 on SL5.x i386/x86_64
Date:  Tue, 30 Jul 2013 14:04:46 +0000
Message-ID:  <20130730140446.11791.5180@slpackages.fnal.gov>

Synopsis: Important: bind97 security update Advisory ID: SLSA-2013:1115-1 Issue Date: 2013-07-30 CVE Numbers: CVE-2013-4854 -- A denial of service flaw was found in BIND. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to crash when rejecting the malformed query. (CVE-2013-4854) After installing the update, the BIND daemon (named) will be restarted automatically. -- SL5 x86_64 bind97-9.7.0-17.P2.el5_9.2.x86_64.rpm bind97-chroot-9.7.0-17.P2.el5_9.2.x86_64.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.2.i386.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.2.x86_64.rpm bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm bind97-devel-9.7.0-17.P2.el5_9.2.x86_64.rpm bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm bind97-libs-9.7.0-17.P2.el5_9.2.x86_64.rpm bind97-utils-9.7.0-17.P2.el5_9.2.x86_64.rpm i386 bind97-9.7.0-17.P2.el5_9.2.i386.rpm bind97-chroot-9.7.0-17.P2.el5_9.2.i386.rpm bind97-debuginfo-9.7.0-17.P2.el5_9.2.i386.rpm bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm bind97-utils-9.7.0-17.P2.el5_9.2.i386.rpm - Scientific Linux Development Team


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds