Revision Date: | 2016-09-28 | Version: | 637 |
Title: | RHSA-2016:1945: bind97 security update (Important) |
Description: | The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)
Red Hat would like to thank ISC for reporting this issue.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2016-2776 RHSA-2016:1945 RHSA-2016:1945-00 RHSA-2016:1945-01 RHSA-2016:1945-01
|
Platform(s): | Red Hat Enterprise Linux 5
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux must be installed OR Package Information
Red Hat Enterprise Linux 5 is installed
AND
bind97 is earlier than 32:9.7.0-21.P2.el5_11.7
AND bind97 is signed with Red Hat redhatrelease2 key
bind97-chroot is earlier than 32:9.7.0-21.P2.el5_11.7
AND bind97-chroot is signed with Red Hat redhatrelease2 key
bind97-devel is earlier than 32:9.7.0-21.P2.el5_11.7
AND bind97-devel is signed with Red Hat redhatrelease2 key
bind97-libs is earlier than 32:9.7.0-21.P2.el5_11.7
AND bind97-libs is signed with Red Hat redhatrelease2 key
bind97-utils is earlier than 32:9.7.0-21.P2.el5_11.7
AND bind97-utils is signed with Red Hat redhatrelease2 key
|