Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-1202

Опубликовано: 08 мая 2017
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2017-1202: bind security update (IMPORTANT)

[32:9.8.2-0.62.rc1.2]

  • Fix DNSKEY that encountered a CNAME (#1447869, ISC change 3391)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

bind

9.8.2-0.62.rc1.el6_9.2

bind-chroot

9.8.2-0.62.rc1.el6_9.2

bind-devel

9.8.2-0.62.rc1.el6_9.2

bind-libs

9.8.2-0.62.rc1.el6_9.2

bind-sdb

9.8.2-0.62.rc1.el6_9.2

bind-utils

9.8.2-0.62.rc1.el6_9.2

Oracle Linux i686

bind

9.8.2-0.62.rc1.el6_9.2

bind-chroot

9.8.2-0.62.rc1.el6_9.2

bind-devel

9.8.2-0.62.rc1.el6_9.2

bind-libs

9.8.2-0.62.rc1.el6_9.2

bind-sdb

9.8.2-0.62.rc1.el6_9.2

bind-utils

9.8.2-0.62.rc1.el6_9.2

Oracle Linux sparc64

bind

9.8.2-0.62.rc1.el6_9.2

bind-chroot

9.8.2-0.62.rc1.el6_9.2

bind-devel

9.8.2-0.62.rc1.el6_9.2

bind-libs

9.8.2-0.62.rc1.el6_9.2

bind-sdb

9.8.2-0.62.rc1.el6_9.2

bind-utils

9.8.2-0.62.rc1.el6_9.2

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

CVSS3: 7.5
redhat
больше 8 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

CVSS3: 7.5
nvd
больше 6 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

CVSS3: 7.5
debian
больше 6 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC vali ...

CVSS3: 7.5
github
больше 3 лет назад

A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.