The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. BIND includes a DNS server (named); a resolverlibrary (routines for applications to use when interfacing with DNS); andtools for verifying that the DNS server is operating correctly.A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND wasrunning as a DNSSEC-validating resolver, it could incorrectly cacheNXDOMAIN responses, as if they were valid, for records proven by NSEC orNSEC3 to exist. A remote attacker could use this flaw to cause a BINDserver to return the bogus, cached NXDOMAIN responses for valid records andprevent users from retrieving those records (denial of service).(CVE-2010-0097)The original fix for CVE-2009-4022 was found to be incomplete. BIND wasincorrectly caching certain responses without performing proper DNSSECvalidation. CNAME and DNAME records could be cached, without proper DNSSECvalidation, when received from processing recursive client queries thatrequested DNSSEC records but indicated that checking should be disabled. Aremote attacker could use this flaw to bypass the DNSSEC validation checkand perform a cache poisoning attack if the target BIND server wasreceiving such client queries. (CVE-2010-0290)All BIND users are advised to upgrade to these updated packages, whichcontain a backported patch to resolve these issues. After installing theupdate, the BIND daemon (named) will be restarted automatically.