Updated bind97 packages that fix one security issue are now available forRed Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. BIND includes a DNS server (named); a resolverlibrary (routines for applications to use when interfacing with DNS); andtools for verifying that the DNS server is operating correctly.A flaw was found in the way BIND handled requests for TKEY DNS resourcerecords. A remote attacker could use this flaw to make named (functioningas an authoritative DNS server or a DNS resolver) exit unexpectedly with anassertion failure via a specially crafted DNS request packet.(CVE-2015-5477)Red Hat would like to thank ISC for reporting this issue. Upstreamacknowledges Jonathan Foote as the original reporter.All bind97 users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing theupdate, the BIND daemon (named) will be restarted automatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
bind97-9.7.0-21.P2.el5_11.2.src.rpm
    MD5: ab0a64be373f55a145490f42fdfeaa5aSHA-256: 10800941c89cda14bb4be157b60250ffb011cc34ed44637705928039e6202df0
 
IA-32:
bind97-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: c99440da85438392c463dd007980d52bSHA-256: 3e7b616f01353a867bfa79606353869a0dae212c2dfb18cb716c98a87e37e13c
bind97-chroot-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: ea1844baac28a930fd1267be3c1310e1SHA-256: 52ca2e595f7bae96756e3c9df027606304ee715762b38286cc3f98cb31769ae4
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 7fbeb1ecb2bd715ab4bfeb1d5a4169d9SHA-256: ebdc4b8360ae2468485afbc06b5b136607fa711ca19aa85af10bf947939307f3
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 5e1f318fe5eaa71316f29c887b5671cbSHA-256: 32c38b7293f37a2d8e6abfc2eb1943ecef70372e645baa0c9ad8ea7044d9f150
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 340614d9bffc784a4aac8a63f56ee794SHA-256: b5557f69077fa3f70bd67c410446b072adeae2b1a6768f64f04e656643c480a4
bind97-utils-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: a44f648a90bd3f32630bc1ae9cc5e37cSHA-256: dc1b919fff6dc9f65c55349496797dbdc9c36eeafd4b3fc487909d78bd8e2701
 
x86_64:
bind97-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 93c6b7a319bed7bd3a51c7b8e95bf225SHA-256: a26d0b5819d7b6b6240a582cbb4a33725679e33189d3cca6cfc69c9ba935252b
bind97-chroot-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: ca2d716fd626e8283e9670b841b5017dSHA-256: 9e2db060f398bfe3c60ee576f1b72d9f11788ad978b70dbb5d3342df6301e38f
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 7fbeb1ecb2bd715ab4bfeb1d5a4169d9SHA-256: ebdc4b8360ae2468485afbc06b5b136607fa711ca19aa85af10bf947939307f3
bind97-debuginfo-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: b06b1ebcd2fdb1b3e972907ce103c5aaSHA-256: 07344fba404f0cde71f4dfb6111a1df6b9b0ab8591d97ead0417d46399b47798
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 5e1f318fe5eaa71316f29c887b5671cbSHA-256: 32c38b7293f37a2d8e6abfc2eb1943ecef70372e645baa0c9ad8ea7044d9f150
bind97-devel-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 466b7d22f7778dcc824b57bfe69f2250SHA-256: 723f2815ae6b5fbc7671b89872f771b2073ff737940879c1ca8d9ba8b1b4cb9c
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 340614d9bffc784a4aac8a63f56ee794SHA-256: b5557f69077fa3f70bd67c410446b072adeae2b1a6768f64f04e656643c480a4
bind97-libs-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 1b4207ace90d62f47b29608a3164e695SHA-256: beb9555fa38d20cbc11372881329f0236afd2a265352d5c14f12f857e0465149
bind97-utils-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 5023429761dbae82cfbb70fe2800a332SHA-256: 846150460d226e0ebd7a8f92ef7c5e52f4e2017b06021f97c02020d17d613b6a
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
bind97-9.7.0-21.P2.el5_11.2.src.rpm
    MD5: ab0a64be373f55a145490f42fdfeaa5aSHA-256: 10800941c89cda14bb4be157b60250ffb011cc34ed44637705928039e6202df0
 
IA-32:
bind97-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: c99440da85438392c463dd007980d52bSHA-256: 3e7b616f01353a867bfa79606353869a0dae212c2dfb18cb716c98a87e37e13c
bind97-chroot-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: ea1844baac28a930fd1267be3c1310e1SHA-256: 52ca2e595f7bae96756e3c9df027606304ee715762b38286cc3f98cb31769ae4
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 7fbeb1ecb2bd715ab4bfeb1d5a4169d9SHA-256: ebdc4b8360ae2468485afbc06b5b136607fa711ca19aa85af10bf947939307f3
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 5e1f318fe5eaa71316f29c887b5671cbSHA-256: 32c38b7293f37a2d8e6abfc2eb1943ecef70372e645baa0c9ad8ea7044d9f150
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 340614d9bffc784a4aac8a63f56ee794SHA-256: b5557f69077fa3f70bd67c410446b072adeae2b1a6768f64f04e656643c480a4
bind97-utils-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: a44f648a90bd3f32630bc1ae9cc5e37cSHA-256: dc1b919fff6dc9f65c55349496797dbdc9c36eeafd4b3fc487909d78bd8e2701
 
IA-64:
bind97-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: b947cdbfff58b7e112a6621ffcdfcb67SHA-256: fad5c8347f362b81ff3c90a4afd821d54643ddbd2187655e49303a53b91570ef
bind97-chroot-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: 993a38bc5e22668c79e6ad67e21c4facSHA-256: be2fd61a7dc65ae90c730b1a589ebbe430dcf557cb57258ab65c9c85c412fc82
bind97-debuginfo-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: 9f7c4173bf4a99999ebe29f960cd4a3eSHA-256: 5b565656fe2d8dc24be5f337b80ad2086a49563578491e62068154fb185b8d29
bind97-devel-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: a93ac8908599c4cbcbb1af955284a7b9SHA-256: 14500dbed609fe0dae57545933d0356205283b9eb42e94cacb17292b234eb117
bind97-libs-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: ff49889a175b30ed8a288efabcae1978SHA-256: a07c29ddc984c768dbe90b2c6e07d513359b6814ebfc2021778c152c96bda89e
bind97-utils-9.7.0-21.P2.el5_11.2.ia64.rpm
    MD5: 868adcbe6d909762bf2ebd3b86bde7d0SHA-256: 588852cef2ec2ed9ac1beaf3f17e510015efadb12ed76f459c46b4c3240ed04f
 
PPC:
bind97-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: eac39358d21726b79e75c4345f53c4baSHA-256: beb1810a74f947656051799a7590e7519868e1c047a4695c6f1818f21c2c0bdf
bind97-chroot-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: 5c85a36a93534b742017d82da14066ffSHA-256: 7cc79847e74124c6bb1c9c846c43a29c998c09e73850b57a03855c1e3b91ba04
bind97-debuginfo-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: 106551f698144176f2eb8e50cbe144ccSHA-256: ddea1d2402175229a8bc7694bef2c832c7bdd072c7e1cfefde69ca59fd15e7dc
bind97-debuginfo-9.7.0-21.P2.el5_11.2.ppc64.rpm
    MD5: 2c2b59c0b6d32e7f677f2630a50ee3deSHA-256: 076bf281f077a8d0c615ae73dd4c75a3f80314bbb6bc637977f73d885404bd01
bind97-devel-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: 6deb528b41524db5a7d9a3895f080677SHA-256: 54f5fd6fbedafeb9e84c3bd6afb83439007838ef8d13edea60c856e7ef8f8855
bind97-devel-9.7.0-21.P2.el5_11.2.ppc64.rpm
    MD5: feaa478a22df4a8616959ea304ace7b8SHA-256: 6e4a33072b91424c81f47e95dca187ce7a354c32784e4c24cdb1b162f707769c
bind97-libs-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: 92a374fd8979e27a56d17debb1f26142SHA-256: 7661a0e0128b3e9d8bad0267f25e3a2b54bd6d9870a393c94c12290870bcf0f3
bind97-libs-9.7.0-21.P2.el5_11.2.ppc64.rpm
    MD5: cb4c89447baed83196cebd4f33aa8468SHA-256: 8cb8a2775dfe2e28f7cfe86baf8470c5d5be1b5917188dfff833f59e1e0d423c
bind97-utils-9.7.0-21.P2.el5_11.2.ppc.rpm
    MD5: 8cb73d3c6e4f6852f9b8b0da74d5fe15SHA-256: 27f1b0aec193ba666869ea01732e31543a4952ec8d2706c11d69727a85deb3d8
 
s390x:
bind97-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: 614853006845d68ddc7278a64dcfd28bSHA-256: 2a93534eee36e71337e1cfdaff2590627b347f3a61dd1fa1665c98aa6f4d4a06
bind97-chroot-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: cd1f801c8cd79be8d6ac36dbd14292dfSHA-256: 4e5baa8d86d3ca0f6a889dc48160c2db1d45a309e8b027193660a0b4bff997c5
bind97-debuginfo-9.7.0-21.P2.el5_11.2.s390.rpm
    MD5: f7ba4b08cb8cd218c50c19e7a596408dSHA-256: b3934da5e672281077f1c43c3b5d9a63e21c0f01ed6b80279e3c8e1114604a03
bind97-debuginfo-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: 2d4523d51332b7f253b793ef392506c3SHA-256: 3187060805a856718744cc7396c84a445854f49be4bf008504933e965995c48c
bind97-devel-9.7.0-21.P2.el5_11.2.s390.rpm
    MD5: 804a18a30fd681aaaf93db5d70dca563SHA-256: 63bc86de8a5bcd177dff3c0658fd6f6b48d7877a8297f04f34c7bbd410767162
bind97-devel-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: b454d0b7f63b81308bce767a9775989bSHA-256: bdb22064b1f2223c6961dfef2f6aadb257e6fcc5e50a667445c0586373e976d5
bind97-libs-9.7.0-21.P2.el5_11.2.s390.rpm
    MD5: 858c8637ee55b2b4c33f20565ac08c92SHA-256: 9145d18a26d735145cea98257983b4901b1d89bfb18397cd3844dfd1e832b6f0
bind97-libs-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: 3da4fab9572bef9e62d19f8bf50b7033SHA-256: 5b4a3285937aacce36b17ed03284ef4fd24140aca1d6110bf59973c7211a2441
bind97-utils-9.7.0-21.P2.el5_11.2.s390x.rpm
    MD5: b09642a6173e13a3bd70d651329c7abbSHA-256: db55615d8c02641968018526ed207d8df80a6084a2a5344cb30508f8736c78ad
 
x86_64:
bind97-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 93c6b7a319bed7bd3a51c7b8e95bf225SHA-256: a26d0b5819d7b6b6240a582cbb4a33725679e33189d3cca6cfc69c9ba935252b
bind97-chroot-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: ca2d716fd626e8283e9670b841b5017dSHA-256: 9e2db060f398bfe3c60ee576f1b72d9f11788ad978b70dbb5d3342df6301e38f
bind97-debuginfo-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 7fbeb1ecb2bd715ab4bfeb1d5a4169d9SHA-256: ebdc4b8360ae2468485afbc06b5b136607fa711ca19aa85af10bf947939307f3
bind97-debuginfo-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: b06b1ebcd2fdb1b3e972907ce103c5aaSHA-256: 07344fba404f0cde71f4dfb6111a1df6b9b0ab8591d97ead0417d46399b47798
bind97-devel-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 5e1f318fe5eaa71316f29c887b5671cbSHA-256: 32c38b7293f37a2d8e6abfc2eb1943ecef70372e645baa0c9ad8ea7044d9f150
bind97-devel-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 466b7d22f7778dcc824b57bfe69f2250SHA-256: 723f2815ae6b5fbc7671b89872f771b2073ff737940879c1ca8d9ba8b1b4cb9c
bind97-libs-9.7.0-21.P2.el5_11.2.i386.rpm
    MD5: 340614d9bffc784a4aac8a63f56ee794SHA-256: b5557f69077fa3f70bd67c410446b072adeae2b1a6768f64f04e656643c480a4
bind97-libs-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 1b4207ace90d62f47b29608a3164e695SHA-256: beb9555fa38d20cbc11372881329f0236afd2a265352d5c14f12f857e0465149
bind97-utils-9.7.0-21.P2.el5_11.2.x86_64.rpm
    MD5: 5023429761dbae82cfbb70fe2800a332SHA-256: 846150460d226e0ebd7a8f92ef7c5e52f4e2017b06021f97c02020d17d613b6a
 
(The unlinked packages above are only available from the Red Hat Network)
1247361 – CVE-2015-5477 bind: TKEY query handling flaw leading to denial of service

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply