ALAS-2013-158


Amazon Linux 1 Security Advisory: ALAS-2013-158
Advisory Release Date: 2013-03-02 16:48 Pacific
Advisory Updated Date: 2014-09-15 22:32 Pacific
Severity: Medium

Issue Overview:

A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5689)


Affected Packages:

bind


Issue Correction:
Run yum update bind to update your system.

New Packages:
i686:
    bind-sdb-9.8.2-0.17.rc1.27.amzn1.i686
    bind-9.8.2-0.17.rc1.27.amzn1.i686
    bind-utils-9.8.2-0.17.rc1.27.amzn1.i686
    bind-chroot-9.8.2-0.17.rc1.27.amzn1.i686
    bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.i686
    bind-devel-9.8.2-0.17.rc1.27.amzn1.i686
    bind-libs-9.8.2-0.17.rc1.27.amzn1.i686

src:
    bind-9.8.2-0.17.rc1.27.amzn1.src

x86_64:
    bind-debuginfo-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-chroot-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-libs-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-devel-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-utils-9.8.2-0.17.rc1.27.amzn1.x86_64
    bind-sdb-9.8.2-0.17.rc1.27.amzn1.x86_64