<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="3035ae67700c7ab936e8b21caeb99807"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="1615">
  <id>dbg111-bind</id>
  <title>bind: potential cache poisoning attack fixed</title>
  <release>openSUSE 11.1</release>
  <issued date="1259331688"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=558260" id="558260" title="bug number 558260" type="bugzilla"/>
  </references>
  <description>The bind DNS server was updated to close a possible cache
poisoning vulnerability which allowed to bypass DNSSEC.
CVE-2009-4022: CVSS v2 Base Score: 2.6
</description>
  <pkglist>
    <collection>
        <package name="bind-debuginfo" arch="i586" version="9.5.0P2" release="18.8.1">
          <filename>bind-debuginfo-9.5.0P2-18.8.1.i586.rpm</filename>
        </package>
        <package name="bind-debuginfo" arch="ppc" version="9.5.0P2" release="18.8.1">
          <filename>bind-debuginfo-9.5.0P2-18.8.1.ppc.rpm</filename>
        </package>
        <package name="bind-debuginfo" arch="x86_64" version="9.5.0P2" release="18.8.1">
          <filename>bind-debuginfo-9.5.0P2-18.8.1.x86_64.rpm</filename>
        </package>
        <package name="bind-debugsource" arch="i586" version="9.5.0P2" release="18.8.1">
          <filename>bind-debugsource-9.5.0P2-18.8.1.i586.rpm</filename>
        </package>
        <package name="bind-debugsource" arch="ppc" version="9.5.0P2" release="18.8.1">
          <filename>bind-debugsource-9.5.0P2-18.8.1.ppc.rpm</filename>
        </package>
        <package name="bind-debugsource" arch="x86_64" version="9.5.0P2" release="18.8.1">
          <filename>bind-debugsource-9.5.0P2-18.8.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
