Amazon Linux 1 Security Advisory: ALAS-2015-465
Advisory Release Date: 2015-01-08 11:36 Pacific
Advisory Updated Date: 2015-01-08 11:44 Pacific
A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500)
Affected Packages:
bind
Issue Correction:
Run yum update bind to update your system.
i686:
bind-utils-9.8.2-0.30.rc1.35.amzn1.i686
bind-9.8.2-0.30.rc1.35.amzn1.i686
bind-chroot-9.8.2-0.30.rc1.35.amzn1.i686
bind-debuginfo-9.8.2-0.30.rc1.35.amzn1.i686
bind-sdb-9.8.2-0.30.rc1.35.amzn1.i686
bind-devel-9.8.2-0.30.rc1.35.amzn1.i686
bind-libs-9.8.2-0.30.rc1.35.amzn1.i686
src:
bind-9.8.2-0.30.rc1.35.amzn1.src
x86_64:
bind-devel-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-utils-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-libs-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-chroot-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-sdb-9.8.2-0.30.rc1.35.amzn1.x86_64
bind-debuginfo-9.8.2-0.30.rc1.35.amzn1.x86_64