Synopsis: Important: bind97 security update
Advisory ID: SLSA-2015:1515-1
Issue Date: 2015-07-29
CVE Numbers: CVE-2015-5477
—
A flaw was found in the way BIND handled requests for TKEY DNS resource
records. A remote attacker could use this flaw to make named (functioning
as an authoritative DNS server or a DNS resolver) exit unexpectedly with
an assertion failure via a specially crafted DNS request packet.
(CVE-2015-5477)
After installing the update, the BIND daemon (named) will be restarted
automatically.
—
SL5
x86_64
bind97-9.7.0-21.P2.el5_11.2.x86_64.rpm
bind97-chroot-9.7.0-21.P2.el5_11.2.x86_64.rpm
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-debuginfo-9.7.0-21.P2.el5_11.2.x86_64.rpm
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-devel-9.7.0-21.P2.el5_11.2.x86_64.rpm
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-libs-9.7.0-21.P2.el5_11.2.x86_64.rpm
bind97-utils-9.7.0-21.P2.el5_11.2.x86_64.rpm
i386
bind97-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-chroot-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
bind97-utils-9.7.0-21.P2.el5_11.2.i386.rpm
– Scientific Linux Development Team