A specially crafted packet can cause named process to exit, affecting DNS services
The Red Hat Security Response Team is aware of the accidental disclosure of the ISC security advisories. We are working to find out more about the vulnerabilities addressed. Reference: http://risky.biz/auscert-bind http://pastebin.com/9NUt8Pk0
http://article.gmane.org/gmane.comp.security.oss.general/5415
Upstream advisory: http://www.isc.org/software/bind/advisories/cve-2011-2464
Created attachment 511313 [details] bind 9.7.3 P1 -> P3 diff Comment / header changes excluded.
Created attachment 511315 [details] bind 9.8.0 P2 -> P4 diff
Created attachment 511316 [details] bind 9.8.0 P2 -> P4 diff Same as comment #6, removing diff for files that only got white-space changes.
Created bind tracking bugs for this issue Affects: fedora-all [bug 719041]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2011:0926 https://rhn.redhat.com/errata/RHSA-2011-0926.html