English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 102521 CVE descriptions
and 54701 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-18469
2010-12-02 18:50:44
--------------------------------------------------------------------------------

Name        : bind
Product     : Fedora 14
Version     : 9.7.2
Release     : 4.P3.fc14
URL         : http://www.isc.org/products/BIND/
Summary     : The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
Description :
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named),
which resolves host names to IP addresses; a resolver library
(routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating properly.

--------------------------------------------------------------------------------
Update Information:

Update to 9.7.2-P3 release which contains various security fixes.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec  2 2010 Adam Tkac <atkac redhat com> 32:9.7.2-4.P3
- update to 9.7.2-P3
* Mon Nov  8 2010 Adam Tkac <atkac redhat com> 32:9.7.2-3.P2
- don't emit various informational messages by default (#645544)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #658982 - CVE-2010-3615 bind: allow-query processed incorrectly allowing access to authoritative zones that should be restricted
        https://bugzilla.redhat.com/show_bug.cgi?id=658982
  [ 2 ] Bug #658974 - CVE-2010-3613 bind: failure to clear existing RRSIG records when a NO DATA is negatively cached could DoS named
        https://bugzilla.redhat.com/show_bug.cgi?id=658974
  [ 3 ] Bug #658977 - CVE-2010-3614 bind: key algorithm rollover may mark secure answers as insecure
        https://bugzilla.redhat.com/show_bug.cgi?id=658977
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update bind' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.