---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for bind SECUNIA ADVISORY ID: SA24014 VERIFY ADVISORY: http://secunia.com/advisories/24014/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for bind. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA23904 SOLUTION: Apply updated packages. 8a6fc679c423ae8ffd70517b457c015f0c165fc5 SRPMS/bind-9.3.4-1.fc5.src.rpm 8a6fc679c423ae8ffd70517b457c015f0c165fc5 noarch/bind-9.3.4-1.fc5.src.rpm 87198d2d5e204388ead07165075660e0b33450f0 ppc/bind-devel-9.3.4-1.fc5.ppc.rpm a8cc807c7fc9b41baf176a5e85b2dfb74b834a43 ppc/caching-nameserver-9.3.4-1.fc5.ppc.rpm 38ced08be1fd3ba99de3f50027fd507f726aed3f ppc/bind-utils-9.3.4-1.fc5.ppc.rpm c6b1e34f533bccab0eaa77822c969ad45ab078b2 ppc/bind-libs-9.3.4-1.fc5.ppc.rpm d5c385eb831513ac417b3e40316098ee76e62a27 ppc/debug/bind-debuginfo-9.3.4-1.fc5.ppc.rpm 8c23369273a5894a5b4a0946e326f40a95b551ae ppc/bind-sdb-9.3.4-1.fc5.ppc.rpm ed68b6d1a3d4a18da303d570ad4204954171d874 ppc/bind-9.3.4-1.fc5.ppc.rpm 1e443539d6ea55adc8aecad0b40c90ba0c002e50 ppc/bind-libbind-devel-9.3.4-1.fc5.ppc.rpm 2cabb34ac71b2f2a5f06b5750154ee7092bcc1f3 ppc/bind-chroot-9.3.4-1.fc5.ppc.rpm c5357b1f10c033f5bafe5f1ba63a5b008138f041 x86_64/bind-devel-9.3.4-1.fc5.x86_64.rpm ebb3161b3de9dcd1967f25d662e9425ae03a12c0 x86_64/debug/bind-debuginfo-9.3.4-1.fc5.x86_64.rpm 57b84db630532386ecd80db71e6f107b8988bcfa x86_64/bind-libs-9.3.4-1.fc5.x86_64.rpm 54d9da829395f3b1d4b152455149d1dd308026db x86_64/bind-sdb-9.3.4-1.fc5.x86_64.rpm 97d74c1f93fe573ecac492c80156b93b749473e1 x86_64/bind-libbind-devel-9.3.4-1.fc5.x86_64.rpm f75a128f40aa9b700b0899d71bdc5be4dd7ce544 x86_64/bind-chroot-9.3.4-1.fc5.x86_64.rpm aa10e939b85f9699f3436fd4d48ad4960a0422aa x86_64/bind-utils-9.3.4-1.fc5.x86_64.rpm c357bd3174653ec7c21ef266ef5d4b0deec2890f x86_64/bind-9.3.4-1.fc5.x86_64.rpm 26bcf44264be0968b373e4e3e6dec2379fda214d x86_64/caching-nameserver-9.3.4-1.fc5.x86_64.rpm e58eec4e15249b1760770ca885167c1a7ef38286 i386/bind-devel-9.3.4-1.fc5.i386.rpm 59454bf9fdd55e311657883f76b9fcf2bb3c6727 i386/bind-libbind-devel-9.3.4-1.fc5.i386.rpm 771dc1a77f138f1272a71842f9bb0f2c2963764a i386/bind-chroot-9.3.4-1.fc5.i386.rpm c196f39959041140cf14f923febc3c994a873d0b i386/debug/bind-debuginfo-9.3.4-1.fc5.i386.rpm 3e884ae7454b13aa5e99faa1d5aed778bb236256 i386/bind-9.3.4-1.fc5.i386.rpm b98210f838bc90253c8a85127829f49034c1e2ed i386/bind-utils-9.3.4-1.fc5.i386.rpm f0fdef54a1b173ac0caa2a5ed0b3cbf391653469 i386/caching-nameserver-9.3.4-1.fc5.i386.rpm a27478c07e1a46b6891b6abbf115a99a312e7a67 i386/bind-sdb-9.3.4-1.fc5.i386.rpm e0d7ecb8fcfdc3bcb9b36eb5b5e0cc6774b23a5b i386/bind-libs-9.3.4-1.fc5.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2537 OTHER REFERENCES: SA23904: http://secunia.com/advisories/23904/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------