An update for bind97 is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain NameSystem (DNS) protocols.

BIND includes a DNS server (named); a resolver library(routines for applications to use when interfacing with DNS); and tools forverifying that the DNS server is operating correctly.Security Fix(es):* A denial of service flaw was found in the way BIND handled a query responsecontaining inconsistent DNSSEC information.

A remote attacker could use thisflaw to make named exit unexpectedly with an assertion failure via a speciallycrafted DNS response. (CVE-2016-9147)Red Hat would like to thank ISC for reporting this issue.
For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing the update, the BIND daemon (named) will be restartedautomatically.RHEL Desktop Workstation (v. 5 client)

SRPMS:
bind97-9.7.0-21.P2.el5_11.10.src.rpm
    MD5: 775235c19dfed27ecc3a87fcf4c40bfeSHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
 
IA-32:
bind97-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: d161503b1eb11a3b37235dc344616e51SHA-256: bd154f2d6aeda14322634dc1bd1c99b15ff594ff870cbdcbb55ca6b0ef0f4d1a
bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 9af3f5d76022263cc5800b23bc048f15SHA-256: b32478f126dd5c40666d83dab756c0ff8c90eacfa48416ad623f2f676619d09f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: ec280c1b10a72260fc27227f9565905bSHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 8763e501a1b0ab618e6f6d3919a9e273SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: f95e8fa0928e9d57204152a97ec01295SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 0b24182f88268c8b2efe5cda8160395dSHA-256: a8938654bc64386bfeb3d9e0ac777b6259881ef03c80cac73a914d1c9f2f9fce
 
x86_64:
bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: ef27ef4f7cc6d7f086d49a492846b956SHA-256: 98dc796069d5aabb624ffe2d1a2a45d639cc6051397adc05c7af9a32fde5a7b0
bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 5bc9d2cb8f487f35a5498c657d2dbcadSHA-256: 27f1d2b557dac6e1a299a35fed36213ff4d4334fd692964856058917b96d0a20
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: ec280c1b10a72260fc27227f9565905bSHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 18777663795b1cdeea79be42597afaa0SHA-256: 61ccdfeba11bf279c3e0cf5848efddf3e68fb20473d1142532071a2cce484423
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 8763e501a1b0ab618e6f6d3919a9e273SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 44145df6812d167f606fe103d8206ccaSHA-256: 10a5f680dc4f28539dd603129ce10122844080fedc1e5347ec2a39ab9e804577
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: f95e8fa0928e9d57204152a97ec01295SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: c03f73dcaf116f13f69dd5665f60bc76SHA-256: c245aa94dde45616a8b07424c17c3329dbb6d16e384b2675926dc51546965e1e
bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: fcc62373eddcb27a6bad4f72c36fa0f1SHA-256: 7703f33bf6aebcc6413e2797429859ea74791ca764206f24deccaeb1b6802935
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
bind97-9.7.0-21.P2.el5_11.10.src.rpm
    MD5: 775235c19dfed27ecc3a87fcf4c40bfeSHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
 
IA-32:
bind97-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: d161503b1eb11a3b37235dc344616e51SHA-256: bd154f2d6aeda14322634dc1bd1c99b15ff594ff870cbdcbb55ca6b0ef0f4d1a
bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 9af3f5d76022263cc5800b23bc048f15SHA-256: b32478f126dd5c40666d83dab756c0ff8c90eacfa48416ad623f2f676619d09f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: ec280c1b10a72260fc27227f9565905bSHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 8763e501a1b0ab618e6f6d3919a9e273SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: f95e8fa0928e9d57204152a97ec01295SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 0b24182f88268c8b2efe5cda8160395dSHA-256: a8938654bc64386bfeb3d9e0ac777b6259881ef03c80cac73a914d1c9f2f9fce
 
IA-64:
bind97-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: 660bca5c1321b488cbf4779c1c2f11e0SHA-256: 25fc1af1d36945d2a66bc7d6679aff650fde3aec2c510986a6146be7eac0b19c
bind97-chroot-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: 1d9d1d0b4ae278914b7d05f42a95f2bcSHA-256: 321d12a4bd0e94c1860ef3fe2cfc1901b74774f116d5f7a51e7b7a99e17ffe22
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: 52a34d4250ffac94eff0c705068857b0SHA-256: 55dfbf9e07267587a83eaa475c8832ed95b23dc34fd299c1f25af212fd8af2cc
bind97-devel-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: ee27e13925fecd1ac8969f7763fe4bfaSHA-256: 8d8fb997d805b76a48ac9dc2163e3b8416b60b6d4c4c6d745939daadb404d58f
bind97-libs-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: 0f2a9f5685f634fd9f967547040b515dSHA-256: be436a3cffa3ef9a68c7839acc4dda510f24761878d91b483be2115b8846b0a3
bind97-utils-9.7.0-21.P2.el5_11.10.ia64.rpm
    MD5: def465fbbaaf8cacb1db0b7e4221809dSHA-256: 26122f16acda45688bfdcb7549040c8b6e27ffe2c65982995b83809161409f0a
 
PPC:
bind97-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: 082939f4054671c734996f707c7695bfSHA-256: be87c2d9ead10483e43b6c9da98d32be4ddae3f14997a2184e330990b171f333
bind97-chroot-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: 142640e509a66036fb58ff542e46efcdSHA-256: 45edf52af0598425ef54664086dd707db2eea15d47afa28fea2b7aa6f0321083
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: 09f0807a0daab96bd8805da486496c7eSHA-256: aff7692b448499961de5cbf0eea8a6fb81c34fde4597eec296072330220e68a7
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc64.rpm
    MD5: aa39af59ff4fe29755ace86405cf8b22SHA-256: 6376430483939d7ad0db97a8a1156d9c72064d594a600c21d4f88eebc1d33b89
bind97-devel-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: 922776595b8f3a185ac2fa84f57479adSHA-256: 109f6f0f16fb15662d8907304b0877582b9fe45591b4dcb150ae457b596c89d5
bind97-devel-9.7.0-21.P2.el5_11.10.ppc64.rpm
    MD5: c76035178e0e7782f043b237ee9e97fbSHA-256: 510c1baab39761e1a1a88970387070de44b76d5af1acaf2fdd9016f243c83023
bind97-libs-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: 664487d135c3e28acd7e467c6899a81aSHA-256: f8d918fc48bfb0130a9ad55f108f97b4cae0ca86e5b1b6d094736b5c52374d52
bind97-libs-9.7.0-21.P2.el5_11.10.ppc64.rpm
    MD5: 1cee232acc08b8adac880fddafc065dcSHA-256: d99d84935331b95576165bc1d31078374bcfa95f486527761008225abb50fc84
bind97-utils-9.7.0-21.P2.el5_11.10.ppc.rpm
    MD5: fbf61dca6a7e2e5291ede6d47382c81cSHA-256: 26df5b626946642c8c3b921de452caf17f8571e8606144f7571aed1fc6fb0f06
 
s390x:
bind97-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: 78343defc4958ff5a2167fc8f933e293SHA-256: b5704420b946672b7e7e06918437b47011328b7fa892981aebbc1ce47cb91e75
bind97-chroot-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: 60cb9028bd05ff76e46c48850a48ff07SHA-256: 4a70e173e10ed269ba164840c01469038b031458a0fa4e30fe4b9cc5f4e3676f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390.rpm
    MD5: 779688bb0d3095c8c477a1c4d424a478SHA-256: 72bf17e09c333da1a9a74f6e2c83c49c4507b0fffdb03ddcc3e671fce5f907ee
bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: 2b164a982967937a35dad1e1dce02466SHA-256: 3c5814053c62cad73796906d52da1c944373ad843433bf9a241c9051bb1542db
bind97-devel-9.7.0-21.P2.el5_11.10.s390.rpm
    MD5: 205e2013ba29261e7eaccd3b49ea2ccdSHA-256: 753c912b2aa982a999a26ff1aac596b4ecf95eb86ac3270e463fd74ab98b7bed
bind97-devel-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: c332673444a1ba7a8cb963df6f549aa9SHA-256: ad58c39179557f248bec55d0f491d174b5903a2405c6ba01d18e471bf93b89e7
bind97-libs-9.7.0-21.P2.el5_11.10.s390.rpm
    MD5: 6118de1c9e958a60e0322f43a9afa753SHA-256: afd0ae8e5827b456eb283574dc7b58d0db8dd2ecaa22b5ace7ada254ff4ed426
bind97-libs-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: 5d2692ac5824ee9c6c493c2d3ff11e61SHA-256: 5455ee4ceee38603de5d610309e86289c1729216d16c225528aca5a42ac731bd
bind97-utils-9.7.0-21.P2.el5_11.10.s390x.rpm
    MD5: c8778e549bd96a890234bc47ad7dbcadSHA-256: 83c8e2eaf5af241fb6e1526b433d460f124dded2f6b5d2d26e7552bea8cf0b44
 
x86_64:
bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: ef27ef4f7cc6d7f086d49a492846b956SHA-256: 98dc796069d5aabb624ffe2d1a2a45d639cc6051397adc05c7af9a32fde5a7b0
bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 5bc9d2cb8f487f35a5498c657d2dbcadSHA-256: 27f1d2b557dac6e1a299a35fed36213ff4d4334fd692964856058917b96d0a20
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: ec280c1b10a72260fc27227f9565905bSHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 18777663795b1cdeea79be42597afaa0SHA-256: 61ccdfeba11bf279c3e0cf5848efddf3e68fb20473d1142532071a2cce484423
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: 8763e501a1b0ab618e6f6d3919a9e273SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: 44145df6812d167f606fe103d8206ccaSHA-256: 10a5f680dc4f28539dd603129ce10122844080fedc1e5347ec2a39ab9e804577
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm
    MD5: f95e8fa0928e9d57204152a97ec01295SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: c03f73dcaf116f13f69dd5665f60bc76SHA-256: c245aa94dde45616a8b07424c17c3329dbb6d16e384b2675926dc51546965e1e
bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm
    MD5: fcc62373eddcb27a6bad4f72c36fa0f1SHA-256: 7703f33bf6aebcc6413e2797429859ea74791ca764206f24deccaeb1b6802935
 
(The unlinked packages above are only available from the Red Hat Network)

1411367 – CVE-2016-9147 bind: assertion failure while handling a query response containing inconsistent DNSSEC information

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply