An update for bind97 is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain NameSystem (DNS) protocols. BIND includes a DNS server (named); a resolver library(routines for applications to use when interfacing with DNS); and tools forverifying that the DNS server is operating correctly.Security Fix(es):* A denial of service flaw was found in the way BIND handled responsescontaining a DNAME answer. A remote attacker could use this flaw to make namedexit unexpectedly with an assertion failure via a specially crafted DNSresponse. (CVE-2016-8864)Red Hat would like to thank ISC for reporting this issue. Upstream acknowledgesTony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as theoriginal reporters.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, the BIND daemon (named) will be restartedautomatically.RHEL Desktop Workstation (v. 5 client)

SRPMS:
bind97-9.7.0-21.P2.el5_11.9.src.rpm
    MD5: d86f38e04e69dc4ed02b5f1664e2ddfcSHA-256: 77ed0b67e37479cd8959a42c44cabef7f57da414351c9e05d448bb03c995885f
 
IA-32:
bind97-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: d39c8ba475355ccb6381611e6ebccf5fSHA-256: b908ec79f458523b6b36c96da67b00ddbf36dc0409393e6fb379dc5ec45c2a61
bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 3a11dfb2eabbeb72e1db7e6c3181a838SHA-256: b8042fb2b0f518c20205d1b4ac17c5e5c62059a723ad935fd4f929a62bce3498
bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 60fcca85fcc241455e2d553cfa253b45SHA-256: 490e0f3a62e23b5a0ecc33f57cde836cd3ffdc9c43309e33ca60514d8da105bf
bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 221ba3b77c5c1ffd1faccd8b939db1c0SHA-256: e6b3f36365aeedf71c618659db7bed9843819345be6ebc5e7f984d96a149d19a
bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 6595f3bc0d4c30915298db88bc651241SHA-256: 86b2c17c60f75c213e6ee8ccd1a57a3d32651ae9fd80449c47c2513a67c42971
bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 96fe9d01693fb377012010ca1c25f158SHA-256: 82a9cd39735da2a133c05ab93435713c84e7ee607abc5f5807cef22faf1ab79c
 
x86_64:
bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: ce4b068fa505a6451dbc7837a783b006SHA-256: 338113d375146cf00238cd6567f5eb9901cff198e1ae90c85df9f1da54f174f7
bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 5bb0f19f3bffac839db3169340d9b3f0SHA-256: bd02575448ff46ca06ac3c5c67ec8ffff143f5737bc0c1e7e8273612fdddde63
bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 60fcca85fcc241455e2d553cfa253b45SHA-256: 490e0f3a62e23b5a0ecc33f57cde836cd3ffdc9c43309e33ca60514d8da105bf
bind97-debuginfo-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 51470e47fa06c50e0a8a17e63a10372eSHA-256: 2e45ec30a7529fb1562e8edb893a4700a78debb3309a4e0108b32bf470362d83
bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 221ba3b77c5c1ffd1faccd8b939db1c0SHA-256: e6b3f36365aeedf71c618659db7bed9843819345be6ebc5e7f984d96a149d19a
bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: bc2acf930fcfcbaff39653a1b218140bSHA-256: 08933de9579654c0f0da3c7743b8e3a59daeac1394193075ae2f95adcfd3ba19
bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 6595f3bc0d4c30915298db88bc651241SHA-256: 86b2c17c60f75c213e6ee8ccd1a57a3d32651ae9fd80449c47c2513a67c42971
bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 965bd7e05203456921251d3c1a227f5eSHA-256: e07adb776151040faf3efc974f9ad9996c04af6a83deb2878f708930156fa704
bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 571b840713bae88bd18c317e39387f45SHA-256: 07330926ab1cfa5c6dde29ab8ec45531db2965e149adc22ce0ddd76573688820
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
bind97-9.7.0-21.P2.el5_11.9.src.rpm
    MD5: d86f38e04e69dc4ed02b5f1664e2ddfcSHA-256: 77ed0b67e37479cd8959a42c44cabef7f57da414351c9e05d448bb03c995885f
 
IA-32:
bind97-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: d39c8ba475355ccb6381611e6ebccf5fSHA-256: b908ec79f458523b6b36c96da67b00ddbf36dc0409393e6fb379dc5ec45c2a61
bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 3a11dfb2eabbeb72e1db7e6c3181a838SHA-256: b8042fb2b0f518c20205d1b4ac17c5e5c62059a723ad935fd4f929a62bce3498
bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 60fcca85fcc241455e2d553cfa253b45SHA-256: 490e0f3a62e23b5a0ecc33f57cde836cd3ffdc9c43309e33ca60514d8da105bf
bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 221ba3b77c5c1ffd1faccd8b939db1c0SHA-256: e6b3f36365aeedf71c618659db7bed9843819345be6ebc5e7f984d96a149d19a
bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 6595f3bc0d4c30915298db88bc651241SHA-256: 86b2c17c60f75c213e6ee8ccd1a57a3d32651ae9fd80449c47c2513a67c42971
bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 96fe9d01693fb377012010ca1c25f158SHA-256: 82a9cd39735da2a133c05ab93435713c84e7ee607abc5f5807cef22faf1ab79c
 
IA-64:
bind97-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: 2f711655473a1815f20998ee5fae1bf7SHA-256: b7a0c059e7ce308685c7cfbd1e8fbde616f6afd41c0988e4c84e57b2528161ca
bind97-chroot-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: ae5c419ffe7c57fdf6302569fc604134SHA-256: 511dda1539959689f271bff503d966d9e8c2610579ec20f7d39c8b8c8159e550
bind97-debuginfo-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: 4a4e8306c4e10220950d89e5438b5830SHA-256: 5b6da521abc99f41ae844f7b3d0ea200da72cc5e5ace79809ac546c6ab1d438b
bind97-devel-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: 94bec8e83059579919382822379b73a9SHA-256: 844897815afac13d7233e9787417dccb0a92102eeafa8637e0d6bf120291ed70
bind97-libs-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: bdca18ca1a6a11c97f8e9a6e8059f1c6SHA-256: b92298093e6c7e9eb549c51dafb3ec3fa05d6f66a43c925f6ebf9c15cd164de3
bind97-utils-9.7.0-21.P2.el5_11.9.ia64.rpm
    MD5: c19fbdd3f4b20f04c9ce66ad5c1ace06SHA-256: a00f8569b32f045259d9bc5e3e68fe3a36c808c70e6d1c710bb1795f88830734
 
PPC:
bind97-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: 387b23c91e979ac4cbdbed76c078b900SHA-256: 6b777c312b24ae01114745e89627182d4f98b3483d7b1c54d6b078fc68a8e99c
bind97-chroot-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: 8c8ff8c5698481964f19f8c69d779cf0SHA-256: 199cd10939b78743eb35765ea5f7c53b908d3c59187d53b2acad7a09294ef8d1
bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: c8b777ee945e23a25b69b93905704477SHA-256: 95c077861200b2d5604f55037e91c901ebb2900a5b7e198658198de2f5924b3a
bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc64.rpm
    MD5: 680fb8ac9e1b1190d105cf9cb385b516SHA-256: 016c9a03092b0392d5a3f47efcffef71bdbd1bcad23f1d31ab38fcab23639471
bind97-devel-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: 19fa29cd616848ccd77b78e57ac67698SHA-256: f568f61e3552937fbbb17c94387b1fbb48cc0006607f9041f5c413ca0981406c
bind97-devel-9.7.0-21.P2.el5_11.9.ppc64.rpm
    MD5: 57d43a4034b66eeb38e6461983428492SHA-256: a194ba0766f62db8502b4e3281129f96e67e540a33eb9c2008c17b320ab70cc6
bind97-libs-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: f58cef9f97c71e047bae2149c2fcdd1fSHA-256: 8d257c693954c8d4342e74dcf83fd57c10f7bfa120bf159c9d99bb791110364d
bind97-libs-9.7.0-21.P2.el5_11.9.ppc64.rpm
    MD5: fb99eb5b33622bf35728a8737cad4838SHA-256: ebb658bda2e8e51c7cfe5a21cbb6fd78ae7066f0fb28a5bc33b0148c56af4cf3
bind97-utils-9.7.0-21.P2.el5_11.9.ppc.rpm
    MD5: e5a725d9d4958ec712134163dd0e02d1SHA-256: a732058b863e70d57316bc370cbb289ebc796c1ed61b211e52b7cb7b612bc60a
 
s390x:
bind97-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 443f1bc73505369b02462737ff14aa40SHA-256: faf3017e1f8ba2e525a17095f3b6dc380a12e6db6a36c59d25a1b6bf972a8582
bind97-chroot-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 36519e146485aa061d73638a47fab368SHA-256: ae22ae1ca62aed4a6a478ab6f3bd63624011335d876b4968b2129d10bda64716
bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390.rpm
    MD5: b2c685cdec06516d68ebbbf794684259SHA-256: 470f0f2eb08fbc2e8f67cde0f8ffd636a93ed9e30817fe8c92414aab5ebb0e2a
bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 2731af892310e6f0bc3c3bb9c6d9dc77SHA-256: 994807165a47a396a41965709ebc6fb7d54666f29b809af9097f929c7829f085
bind97-devel-9.7.0-21.P2.el5_11.9.s390.rpm
    MD5: 907091e23391c9316fe244be1686971dSHA-256: 3e48f3b759bdd17894d06292db4d40f87927f631b926e38dd2df166da3d45bbc
bind97-devel-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 2388cf3a487c43271d8b56470ddd1564SHA-256: d34578415feb17b253091aa92287daf03b207b2838a8902bbce4580629ce9df1
bind97-libs-9.7.0-21.P2.el5_11.9.s390.rpm
    MD5: 86a9db6b5041a2f84e255c904d2dcc45SHA-256: 703a4016db20f73f906a2e259298cb7da29167d0f85dc4b86a4e81935224b0db
bind97-libs-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 01c0136e9496c9fbb0ba1dcf379561faSHA-256: 7ebcf5d602e0aa5ed9f046bd62790e0e98750d186112462c315b1139be8874e0
bind97-utils-9.7.0-21.P2.el5_11.9.s390x.rpm
    MD5: 2640789f02166ef92082195767360085SHA-256: 9eeb0d636a674f94f140519154a636ae94fd467f4139a2be9ecab1cc62d39766
 
x86_64:
bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: ce4b068fa505a6451dbc7837a783b006SHA-256: 338113d375146cf00238cd6567f5eb9901cff198e1ae90c85df9f1da54f174f7
bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 5bb0f19f3bffac839db3169340d9b3f0SHA-256: bd02575448ff46ca06ac3c5c67ec8ffff143f5737bc0c1e7e8273612fdddde63
bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 60fcca85fcc241455e2d553cfa253b45SHA-256: 490e0f3a62e23b5a0ecc33f57cde836cd3ffdc9c43309e33ca60514d8da105bf
bind97-debuginfo-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 51470e47fa06c50e0a8a17e63a10372eSHA-256: 2e45ec30a7529fb1562e8edb893a4700a78debb3309a4e0108b32bf470362d83
bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 221ba3b77c5c1ffd1faccd8b939db1c0SHA-256: e6b3f36365aeedf71c618659db7bed9843819345be6ebc5e7f984d96a149d19a
bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: bc2acf930fcfcbaff39653a1b218140bSHA-256: 08933de9579654c0f0da3c7743b8e3a59daeac1394193075ae2f95adcfd3ba19
bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm
    MD5: 6595f3bc0d4c30915298db88bc651241SHA-256: 86b2c17c60f75c213e6ee8ccd1a57a3d32651ae9fd80449c47c2513a67c42971
bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 965bd7e05203456921251d3c1a227f5eSHA-256: e07adb776151040faf3efc974f9ad9996c04af6a83deb2878f708930156fa704
bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm
    MD5: 571b840713bae88bd18c317e39387f45SHA-256: 07330926ab1cfa5c6dde29ab8ec45531db2965e149adc22ce0ddd76573688820
 
(The unlinked packages above are only available from the Red Hat Network)

1389652 – CVE-2016-8864 bind: assertion failure while handling responses containing a DNAME answer

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply