How to patch your server against CVE-2015-5477
CVE-2015-5477 is a vulnerability in the popular BIND DNS software. Below is a guide on how to patch your server against this vulnerability:
Ubuntu:
# apt-get install bind9
CentOS:
You will need to enable the Continuous Release (CR) Repository in order to get this patch, this can be done using the following commands
# yum install centos-release-cr # yum-config-manager --enable cr # yum update bind
Optionally, once the above steps have been completed, you can disable the CR repositiory by running:
# yum-config-manager --disable cr
Once you have updated your server you can verify the patch has applied successfully by running:
rpm -q --changelog bind | grep CVE-2015-5477
If the patch has been successfully applied then you will see the following output:
- Fix CVE-2015-5477