Date: Thu, 30 Jul 2009 14:02:41 -0500 Reply-To: Connie SiehSender: Security Errata for Scientific Linux From: Connie Sieh Subject: Security ERRATA Important: bind for SL 5.x on i386/x86_64 Comments: To: scientific Synopsis: Important: bind security update CVE Names: CVE-2009-0696 CVE-2009-0696 bind: DoS (assertion failure) via nsupdate packets A flaw was found in the way BIND handles dynamic update message packets containing the "ANY" record type. A remote attacker could use this flaw to send a specially-crafted dynamic update packet that could cause named to exit with an assertion failure. (CVE-2009-0696) Note: even if named is not configured for dynamic updates, receiving such a specially-crafted dynamic update packet could still cause named to exit unexpectedly. After installing the update, the BIND daemon (named) will be restarted automatically. SRPM: bind-9.3.4-10.P1.el5_3.3.src.rpm i386: bind-9.3.4-10.P1.el5_3.3.i386.rpm bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm bind-sdb-9.3.4-10.P1.el5_3.3.i386.rpm bind-utils-9.3.4-10.P1.el5_3.3.i386.rpm bind-chroot-9.3.4-10.P1.el5_3.3.i386.rpm bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm caching-nameserver-9.3.4-10.P1.el5_3.3.i386.rpm x86_64: bind-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-libs-9.3.4-10.P1.el5_3.3.i386.rpm bind-libs-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-sdb-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-utils-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-chroot-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-devel-9.3.4-10.P1.el5_3.3.i386.rpm bind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm bind-libbind-devel-9.3.4-10.P1.el5_3.3.i386.rpm bind-libbind-devel-9.3.4-10.P1.el5_3.3.x86_64.rpm caching-nameserver-9.3.4-10.P1.el5_3.3.x86_64.rpm -Connie Sieh -Troy Dawson