bind97 security update

2011-05-31T17:03:46
ID CESA-2011:0845
Type centos
Reporter CentOS Project
Modified 2011-05-31T17:03:46

Description

CentOS Errata and Security Advisory CESA-2011:0845

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

An off-by-one flaw was found in the way BIND processed negative responses with large resource record sets (RRSets). An attacker able to send recursive queries to a BIND server that is configured as a caching resolver could use this flaw to cause named to exit with an assertion failure. (CVE-2011-1910)

All BIND users are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2011-May/029637.html http://lists.centos.org/pipermail/centos-announce/2011-May/029638.html

Affected packages: bind97 bind97-chroot bind97-devel bind97-libs bind97-utils

Upstream details at: https://rhn.redhat.com/errata/RHSA-2011-0845.html