Important CentOS bind97 Security Update
|bind97-9.7.0-21.P2.el5_11.6.i386.rpm, bind97-9.7.0-21.P2.el5_11.6.src.rpm, bind97-9.7.0-21.P2.el5_11.6.x86_64.rpm, bind97-chroot-9.7.0-21.P2.el5_11.6.i386.rpm, bind97-chroot-9.7.0-21.P2.el5_11.6.x86_64.rpm, bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm, bind97-devel-9.7.0-21.P2.el5_11.6.x86_64.rpm, bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm, bind97-libs-9.7.0-21.P2.el5_11.6.x86_64.rpm, bind97-utils-9.7.0-21.P2.el5_11.6.i386.rpm, bind97-utils-9.7.0-21.P2.el5_11.6.x86_64.rpm|
Important CentOS bind Security Update
Updated bind97 packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
A denial of service flaw was found in the way BIND parsed signature records
for DNAME records. By sending a specially crafted query, a remote attacker
could use this flaw to cause named to crash. (CVE-2016-1286)
A denial of service flaw was found in the way BIND processed certain
control channel input. A remote attacker able to send a malformed packet to
the control channel could use this flaw to cause named to crash.
Red Hat would like to thank ISC for reporting these issues.
All bind97 users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.
Please see https://www.redhat.com/footer/terms-of-use.html
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.Sign up for monitoring
Affected package information