Amazon Linux 1 Security Advisory: ALAS-2013-158
Advisory Release Date: 2013-03-02 16:48 Pacific
Advisory Updated Date: 2014-09-15 22:32 Pacific
A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5689)
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
i686:
bind-sdb-9.8.2-0.17.rc1.27.amzn1.i686
bind-9.8.2-0.17.rc1.27.amzn1.i686
bind-utils-9.8.2-0.17.rc1.27.amzn1.i686
bind-chroot-9.8.2-0.17.rc1.27.amzn1.i686
bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.i686
bind-devel-9.8.2-0.17.rc1.27.amzn1.i686
bind-libs-9.8.2-0.17.rc1.27.amzn1.i686
src:
bind-9.8.2-0.17.rc1.27.amzn1.src
x86_64:
bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-chroot-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-libs-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-devel-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-utils-9.8.2-0.17.rc1.27.amzn1.x86_64
bind-sdb-9.8.2-0.17.rc1.27.amzn1.x86_64