Important: bind

2015-01-08T11:44:00
ID ALAS-2015-465
Type amazon
Reporter Amazon
Modified 2015-01-08T11:44:00

Description

Issue Overview:

A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500 __)

Affected Packages:

bind

Issue Correction:
Run yum update bind to update your system.

New Packages:

i686:  
    bind-utils-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-chroot-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-debuginfo-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-sdb-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-devel-9.8.2-0.30.rc1.35.amzn1.i686  
    bind-libs-9.8.2-0.30.rc1.35.amzn1.i686

src:  
    bind-9.8.2-0.30.rc1.35.amzn1.src

x86_64:  
    bind-devel-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-utils-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-libs-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-chroot-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-sdb-9.8.2-0.30.rc1.35.amzn1.x86_64  
    bind-debuginfo-9.8.2-0.30.rc1.35.amzn1.x86_64