bind97 (SL5)

Synopsis: Important: bind97 security update
Issue Date: 2013-03-28
CVE Numbers: CVE-2013-2266

A denial of service flaw was found in the libdns library. A remote
attacker could use this flaw to send a specially-crafted DNS query to
named that, when processed, would cause named to use an excessive amount
of memory, or possibly crash. (CVE-2013-2266)

Note: This update disables the syntax checking of NAPTR (Naming Authority
Pointer) resource records.

After installing the update, the BIND daemon (named) will be restarted
automatically.

SL5
x86_64
bind97-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-chroot-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.x86_64.rpm
bind97-utils-9.7.0-17.P2.el5_9.1.x86_64.rpm
i386
bind97-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-chroot-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-debuginfo-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm
bind97-utils-9.7.0-17.P2.el5_9.1.i386.rpm

– Scientific Linux Development Team