AnNyung Official Homepage Home > Update [ 1.3 ]  

What is AnNyung
Packages System
White Paper
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]

  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15

bind 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1264354872
업데이트 : 2010.01.25


- 9.4.3-5 (9.4.3-P5) update
- root name server information update
- fixed CVE-2010-0097
- fixed CVE-2010-0290

. CVE-2010-0097:
A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was
running as a DNSSEC-validating resolver, it could incorrectly cache
NXDOMAIN responses, as if they were valid, for records proven by NSEC or
NSEC3 to exist. A remote attacker could use this flaw to cause a BIND
server to return the bogus, cached NXDOMAIN responses for valid records and
prevent users from retrieving those records (denial of service).

. CVE-2010-0290:
The original fix for CVE-2009-4022 was found to be incomplete. BIND was
incorrectly caching certain responses without performing proper DNSSEC
validation. CNAME and DNAME records could be cached, without proper DNSSEC
validation, when received from processing recursive client queries that
requested DNSSEC records but indicated that checking should be disabled. A
remote attacker could use this flaw to bypass the DNSSEC validation check
and perform a cache poisoning attack if the target BIND server was
receiving such client queries.

Autoupdates 지원 : 일부 지원
  pkgsysupdate && pkgadd -F "bind*"

update 패키지

  RPMS :

    . bind-9.4.3-5.i686.rpm
    . bind-utils-9.4.3-5.i686.rpm
    . bind-devel-9.4.3-5.i686.rpm


    . bind-9.4.3-5.src.rpm

참고 :


 Home > Update [ 1.3 ]

Copyright 2024 OOPS Development Organization 
LAST MODIFIED: 2018/04/10