Lucene search

K
redhatRedHatRHSA-2012:1267
HistorySep 14, 2012 - 12:00 a.m.

(RHSA-2012:1267) Important: bind security and bug fix update

2012-09-1400:00:00
access.redhat.com
33

EPSS

0.331

Percentile

97.1%

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled resource records with a large
RDATA value. A malicious owner of a DNS domain could use this flaw to
create specially-crafted DNS resource records, that would cause a recursive
resolver or secondary server to exit unexpectedly with an assertion
failure. (CVE-2012-4244)

This update also fixes the following bug:

  • The bind-chroot-admin script, executed when upgrading the bind-chroot
    package, failed to correctly update the permissions of the
    /var/named/chroot/etc/named.conf file. Depending on the permissions of the
    file, this could have prevented named from starting after installing
    package updates. With this update, bind-chroot-admin correctly updates the
    permissions and ownership of the file. (BZ#857056)

Users of bind are advised to upgrade to these updated packages, which
correct these issues. After installing the update, the BIND daemon (named)
will be restarted automatically.