Sicherheit: Denial of Service in dnsperf
Aktuelle Meldungen Distributionen
Name: Denial of Service in dnsperf
ID: FEDORA-2012-15965
Distribution: Fedora
Plattformen: Fedora 17
Datum: Sa, 20. Oktober 2012, 10:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
Applikationen: dnsperf


Name        : dnsperf
Product : Fedora 17
Version :
Release : 2.fc17
URL : http://www.nominum.com/resources/measurement-tools
Summary : Benchmarking authorative and recursing DNS servers
Description :
This is dnsperf, a collection of DNS server performance testing tools.
For more information, see the dnsperf(1) and resperf(1) man pages.

Update Information:

Update to the latest BIND packages to fix CVE-2012-5166 and incorporate other
fixes from upstream. Packages dhcp, bind-dyndb-ldap and dnsperf were rebuilt.

* Thu Oct 11 2012 Adam Tkac <atkac redhat com> -
- rebuild against new bind-libs
- pack sample query file with bz2
* Wed Apr 18 2012 Paul Wouters <pwouters@redhat.com> -
- Upgraded to
- Fixup of URLs
- Add pointer to sample query file in usage info
- Added current query sample file as old example has been removed
- Pulled in missing bind-9.8.x/9.9.x version of hmacsha.h
- Removed doc/*pdf files, as their license might mean non-free

[ 1 ] Bug #864273 - CVE-2012-5166 bind: Specially crafted DNS data can cause
a lockup in named

This update can be installed with the "yum" update program. Use
su -c 'yum update dnsperf' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten