- Issued:
- 2016-11-02
- Updated:
- 2016-11-02
RHSA-2016:2142 - Important: bind97 security update
Synopsis
Important: bind97 security update
Type/Severity
Security Advisory Important
Topic
An update for bind97 is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
- A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)
Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted automatically.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
Updated Packages
- bind97-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-utils-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-utils-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-utils-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc64.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.s390.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.ppc64.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.s390.rpm
- bind97-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-chroot-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-chroot-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-chroot-9.7.0-21.P2.el5_11.9.ia64.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.s390x.rpm
- bind97-libs-9.7.0-21.P2.el5_11.9.ppc.rpm
- bind97-9.7.0-21.P2.el5_11.9.src.rpm
- bind97-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-devel-9.7.0-21.P2.el5_11.9.ppc64.rpm
- bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm
- bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390.rpm
Fixes
CVEs
References
- https://access.redhat.com/security/updates/classification/#important
- Content from kb.isc.org is not included.Content from kb.isc.org is not included.https://kb.isc.org/article/AA-01434
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.