An update for bind97 is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain NameSystem (DNS) protocols. BIND includes a DNS server (named); a resolver library(routines for applications to use when interfacing with DNS); and tools forverifying that the DNS server is operating correctly.Security Fix(es):* A denial of service flaw was found in the way BIND constructed a response to aquery that met certain criteria. A remote attacker could use this flaw to makenamed exit unexpectedly with an assertion failure via a specially crafted DNSrequest packet. (CVE-2016-2776)Red Hat would like to thank ISC for reporting this issue.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, the BIND daemon (named) will be restartedautomatically.RHEL Desktop Workstation (v. 5 client)

SRPMS:
bind97-9.7.0-21.P2.el5_11.7.src.rpm
    MD5: 1748fc33291b2fa4e4c5c670610b02acSHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
 
IA-32:
bind97-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: bf6e2927e602083dfd81c57b77e634a6SHA-256: 7472de1caa798c63ada40aad338137be25ba405e6b9ba7f9a81564172c7caccb
bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: f068f06bc2dea2cab1da422d178918e0SHA-256: 322b78dda5d22e0504eabea3f26cd5ed60e99baff6e5a27bd71222fbe036c9df
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 54fdfa64c198574c9e30d4845756ebfcSHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0c06c585d734b6ebbfbfcf84ac427317SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 72f7706fb48cffd934cef759f63a5604SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0f93f31e7d8bb4b3495a6938100c838bSHA-256: 8f66c5898279f3dd9a92b60c0c27ac321e2b8ba851519036e46389baf591cae7
 
x86_64:
bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 6ac93a2c6f01620fa4dd1eb5a41c0348SHA-256: f1fd5e5c7c6f9819ba78f50a7a157fcfe475b85360009c0abf2e5e4ab17170a6
bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 5a08732384882169b331f94da862222eSHA-256: d210d496d52938ac9ead7ab9477b5dedbb51be81f172e9343f253d88d2bdcaef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 54fdfa64c198574c9e30d4845756ebfcSHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: b802954ab4241545c841c5814f29d6d8SHA-256: a07ad0c8af4e343c5c83f8ac86305630320a8701e2c2b5d610feb62bd79d3b10
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0c06c585d734b6ebbfbfcf84ac427317SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 70a0ecab0d84f2fd999a2959ed154773SHA-256: 5abe2afbdeb87da34aa6d34a96baea76713a95b07bcee0098fbac9e683fed68f
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 72f7706fb48cffd934cef759f63a5604SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 5f1bf8a12bd80e7272cdea5d588732edSHA-256: ab03b45fae69896cb2767979a0670aa5b7a09f64c1dac6edde5c98bd4e5e1fa9
bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: d89b807b15ab2b1b8b3705a2f880139aSHA-256: 30a85bc81352d7121bce0cb1ef580e339c9e56f916605531db470215c835f323
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
bind97-9.7.0-21.P2.el5_11.7.src.rpm
    MD5: 1748fc33291b2fa4e4c5c670610b02acSHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
 
IA-32:
bind97-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: bf6e2927e602083dfd81c57b77e634a6SHA-256: 7472de1caa798c63ada40aad338137be25ba405e6b9ba7f9a81564172c7caccb
bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: f068f06bc2dea2cab1da422d178918e0SHA-256: 322b78dda5d22e0504eabea3f26cd5ed60e99baff6e5a27bd71222fbe036c9df
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 54fdfa64c198574c9e30d4845756ebfcSHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0c06c585d734b6ebbfbfcf84ac427317SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 72f7706fb48cffd934cef759f63a5604SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0f93f31e7d8bb4b3495a6938100c838bSHA-256: 8f66c5898279f3dd9a92b60c0c27ac321e2b8ba851519036e46389baf591cae7
 
IA-64:
bind97-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: ca9ce0305c2125c544981c5c1b9067ccSHA-256: f7efe5a89651a76ecf5a9cc168183f887853a352452e1e00adf3691d0856914f
bind97-chroot-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: 1f03c602d0631abdc7d1c439a6214badSHA-256: 686f84127bc6f1d04ec9446f35cde55112113c3835529e34d1b1974e81e17046
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: 92f737c9e403de219a77f01ce797a271SHA-256: b30f8ede6f2f5be7ebdfdc5274675ca835b7986e2b38516a7c627b391f342b9a
bind97-devel-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: 2d76f43c6635a19991089dc285536549SHA-256: dae04826d06deaec873a1e9ff07fd13fd0329187f1c29091579c0d427659e4c1
bind97-libs-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: 05975180ac1cabd64cf0f20b024e1a5bSHA-256: 729d0defc7c918d0e6b42c82eaeba6032e7a63417c626d4719e17c3a9310549b
bind97-utils-9.7.0-21.P2.el5_11.7.ia64.rpm
    MD5: 5940274604eb72be67981903a7612ff9SHA-256: 0eb742dc1d761dfe772733c2fbb0c1e091d380869c155c5522f6e49913c9bc3e
 
PPC:
bind97-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: c0fd703653ac3caf53f19f9baf6e4db6SHA-256: 4af44ba68c66022fd732e2ef36bc14c9e1ddffa88ac32c3fad62904669582269
bind97-chroot-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: 48724fdfdfdbe3767fbaf3e220b2f967SHA-256: 2caa0695e99188e0b0800a047cfc20886b1cff5838aa2452a00a599aa13f9cef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: 6be888162986b5cf018921c8e23df8e4SHA-256: 47f298eff0910ca4ce637611d6575fd883a22b65ef633b3d1cab7a23d7f8f9e7
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc64.rpm
    MD5: 0f5cbf0a10f4335f44d2f50e35dbacafSHA-256: 8c2a2a5d043031bc533746e1ebed5214a24c7df7d2592626cb403c9c6a1185a4
bind97-devel-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: a4e07164496d3d41af076eab66b31014SHA-256: bd2538ee3be8eed45607adc561e27fc8bd9fcdea6b3524ee4279223362b9d593
bind97-devel-9.7.0-21.P2.el5_11.7.ppc64.rpm
    MD5: eaa15092b61da30e81a2f17da3408cbaSHA-256: 8a8dc336900a08ea151765b5bf334cd5e37f2908dd8eb3182fdbac273d3327fb
bind97-libs-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: f7d9aeea5e5e6d450fd566f7d34020a2SHA-256: b4e342e8374d00a2a5f8300ef158e000a7b369c8bd0060ac8d7bd518938253d4
bind97-libs-9.7.0-21.P2.el5_11.7.ppc64.rpm
    MD5: 57494783bfeab1d95635502a7a74782fSHA-256: 987305a328242bb3ba8e76c16de0220100d0ca02ee17b73580164e49a69c500a
bind97-utils-9.7.0-21.P2.el5_11.7.ppc.rpm
    MD5: 190d384bbfa765e7c890e1c4ffbab834SHA-256: 2d6804ef50fddae72985b1f69afab6a9148f1ac2af3683e91046547a39b5e9b9
 
s390x:
bind97-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: 04dc3cd7b6ed0ce4a3ff744af7d285c8SHA-256: a0054a2f2d54beda63dc4a6035d4cc1260bac84c04962c15e81cc9a67bad33af
bind97-chroot-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: 32d9c72b10b53233a295b10db2f9bca1SHA-256: fda1c0c950e0189395323889c5c98c73c86203a78963b2be7b614ae82aaf31f3
bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390.rpm
    MD5: 5410e36fb3a197e10aa9bf70fbd4cbb8SHA-256: 0f7c5709e3ae6f37ca8367b69c4df53ffea83124e408aff3283a3a9381ebd29f
bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: 1e13aea4e14b760a6186eb57471eaaaeSHA-256: 995476d30b5d202d66962fa45954fc97650a2e31b04fb1a23658305b96a3f3e8
bind97-devel-9.7.0-21.P2.el5_11.7.s390.rpm
    MD5: 15df54aaaaeed83e371607fe87dde753SHA-256: 63fe50ebdcedd49f2ac7242fd59e539221c1e76683ae91fddbc37e4897415284
bind97-devel-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: ea130cf4315baebff6120c9761978989SHA-256: 0bc56058b5f914273d9203a38e53a32071278218668716a7cc316738fbfc4124
bind97-libs-9.7.0-21.P2.el5_11.7.s390.rpm
    MD5: c68a8e57852b1220911b028a964cfefdSHA-256: f569fe62ddee42ba28376cd4eef7296ad504af58163363a2fbc11ef8ab4eba17
bind97-libs-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: c0b8c6b8be3b416fb4c690c6189458d8SHA-256: 8995b89ac80f3f6d7793ad8427488541e077e12efa2afcb8ce06bbcf6bb325b4
bind97-utils-9.7.0-21.P2.el5_11.7.s390x.rpm
    MD5: e7550331ff4084e22b9e117c75dedfc8SHA-256: 1ca967ff2a5f279235ca40d23ff22141daf618271182c30d325f2e2693cab36d
 
x86_64:
bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 6ac93a2c6f01620fa4dd1eb5a41c0348SHA-256: f1fd5e5c7c6f9819ba78f50a7a157fcfe475b85360009c0abf2e5e4ab17170a6
bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 5a08732384882169b331f94da862222eSHA-256: d210d496d52938ac9ead7ab9477b5dedbb51be81f172e9343f253d88d2bdcaef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 54fdfa64c198574c9e30d4845756ebfcSHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: b802954ab4241545c841c5814f29d6d8SHA-256: a07ad0c8af4e343c5c83f8ac86305630320a8701e2c2b5d610feb62bd79d3b10
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 0c06c585d734b6ebbfbfcf84ac427317SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 70a0ecab0d84f2fd999a2959ed154773SHA-256: 5abe2afbdeb87da34aa6d34a96baea76713a95b07bcee0098fbac9e683fed68f
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm
    MD5: 72f7706fb48cffd934cef759f63a5604SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: 5f1bf8a12bd80e7272cdea5d588732edSHA-256: ab03b45fae69896cb2767979a0670aa5b7a09f64c1dac6edde5c98bd4e5e1fa9
bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm
    MD5: d89b807b15ab2b1b8b3705a2f880139aSHA-256: 30a85bc81352d7121bce0cb1ef580e339c9e56f916605531db470215c835f323
 
(The unlinked packages above are only available from the Red Hat Network)

1378380 – CVE-2016-2776 bind: assertion failure in buffer.c while building responses to a specifically constructed request

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply