Security update for bind
Announcement ID: | SUSE-SU-2016:1541-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for bind fixes two assertion failures that could lead to a remote denial of service attack:
- CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
- CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Cloud 5
zypper in -t patch sleclo50sp3-bind-12608=1
-
SUSE Manager Server 2.1
zypper in -t patch sleman21-bind-12608=1
-
SUSE Manager Proxy 2.1
zypper in -t patch slemap21-bind-12608=1
Package List:
-
SUSE Cloud 5 (x86_64)
- bind-doc-9.9.6P1-0.27.1
- bind-9.9.6P1-0.27.1
- bind-utils-9.9.6P1-0.27.1
- bind-libs-9.9.6P1-0.27.1
- bind-chrootenv-9.9.6P1-0.27.1
- bind-libs-32bit-9.9.6P1-0.27.1
-
SUSE Manager Server 2.1 (s390x x86_64)
- bind-doc-9.9.6P1-0.27.1
- bind-9.9.6P1-0.27.1
- bind-utils-9.9.6P1-0.27.1
- bind-libs-9.9.6P1-0.27.1
- bind-chrootenv-9.9.6P1-0.27.1
- bind-libs-32bit-9.9.6P1-0.27.1
-
SUSE Manager Proxy 2.1 (x86_64)
- bind-doc-9.9.6P1-0.27.1
- bind-9.9.6P1-0.27.1
- bind-utils-9.9.6P1-0.27.1
- bind-libs-9.9.6P1-0.27.1
- bind-chrootenv-9.9.6P1-0.27.1
- bind-libs-32bit-9.9.6P1-0.27.1