Synopsis: Important: bind security update
Issue Date: 2012-12-06
CVE Numbers: CVE-2012-5688
—
A flaw was found in the DNS64 implementation in BIND. If a remote attacker sent
a specially-crafted query to a named server, named could exit unexpectedly with
an assertion failure. Note that DNS64 support is not enabled by default.
(CVE-2012-5688)
After installing the update, the BIND daemon (named) will be restarted
automatically.
—
SL6
x86_64
bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.6.x86_64.rpm
i386
bind-debuginfo-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-libs-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-utils-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-chroot-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-devel-9.8.2-0.10.rc1.el6_3.6.i686.rpm
bind-sdb-9.8.2-0.10.rc1.el6_3.6.i686.rpm
– Scientific Linux Development Team