Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0717 - Security Advisory
Issued:
2012-06-07
Updated:
2012-06-07

RHSA-2012:0717 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: bind97 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind97 packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled zero length resource data records.
A malicious owner of a DNS domain could use this flaw to create
specially-crafted DNS resource records that would cause a recursive
resolver or secondary server to crash or, possibly, disclose portions of
its memory. (CVE-2012-1667)

A flaw was found in the way BIND handled the updating of cached name server
(NS) resource records. A malicious owner of a DNS domain could use this
flaw to keep the domain resolvable by the BIND server even after the
delegation was removed from the parent DNS zone. With this update, BIND
limits the time-to-live of the replacement record to that of the
time-to-live of the record being replaced. (CVE-2012-1033)

Users of bind97 are advised to upgrade to these updated packages, which
correct these issues. After installing the update, the BIND daemon (named)
will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 788650 - CVE-2012-1033 bind: deleted domain name resolving flaw
  • BZ - 828078 - CVE-2012-1667 bind: handling of zero length rdata can cause named to terminate unexpectedly

CVEs

  • CVE-2012-1667
  • CVE-2012-1033

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://www.isc.org/software/bind/advisories/cve-2012-1033
  • http://www.isc.org/software/bind/advisories/cve-2012-1667
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-10.P2.el5_8.1.src.rpm SHA-256: 1fef9778f19902cb43098123efaa2a27438c66b5e8476744731b4fa5ce96fd14
x86_64
bind97-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 35c11c7e243e35672dee5ac8981415a54bd6f39c95a909e109a1e849a2245aff
bind97-chroot-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 3ef7f156a19a29b1ef11ab7f3f36e71c4695c175b22ddeec530d83368bd0390b
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-debuginfo-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 6f8aff905a5a9e9a8cebcd349a93ca3b76db1b52ba1647fa76ef9d3d285c25b0
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-devel-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 572dfaaa95afdb99f9b1c577250ec4a245bba52ed05b9848470d3e282f3374b1
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-libs-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 1530bdb4d6482c48d6119c1de0d392966140903b67711a0da283263587743d11
bind97-utils-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 24380166d08d4930808bdbdbfaa4f0de1de9b1646034021de52bf10296997421
ia64
bind97-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: 7d950801ac43c2caa3f43843e4d579d9b807b2e4c3d049d8a3d225adc4ac7b3f
bind97-chroot-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: c3e7fe3d32338a9d8018f7c8e150a800b06595f03bf071b1282e4f137758c1a6
bind97-debuginfo-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: 5f3a6fbf855ca6c4b95dbed00cdb4b6e40d908e9d85235fcb9e824f6520ea245
bind97-devel-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: 63c90e4566218a4e8d6aae56d4816dd693f779815bd1e60268022262cbbec938
bind97-libs-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: 659bbaeabe6f2261735eaa603789842ff2dd0560959562d659a69767bd0087b7
bind97-utils-9.7.0-10.P2.el5_8.1.ia64.rpm SHA-256: 512b6d99dfd089915b00ab6d9885761fd5f2b1cc34cbf6a422aa560d0f92b9b4
i386
bind97-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 63304fbaeb3edd1f194d59c4bbbd221382aab0e2be261b4f6827b84c2898dcb7
bind97-chroot-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: bac39c8a56dfa5f328c0bdcef4f63250934f99c78e48a72ff09ea2defbbd90c6
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-utils-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 89c341ae74145d55f6725cd51e4bfdeed7c37de846719d740f28e9eeb05393fe

Red Hat Enterprise Linux Workstation 5

SRPM
bind97-9.7.0-10.P2.el5_8.1.src.rpm SHA-256: 1fef9778f19902cb43098123efaa2a27438c66b5e8476744731b4fa5ce96fd14
x86_64
bind97-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 35c11c7e243e35672dee5ac8981415a54bd6f39c95a909e109a1e849a2245aff
bind97-chroot-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 3ef7f156a19a29b1ef11ab7f3f36e71c4695c175b22ddeec530d83368bd0390b
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-debuginfo-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 6f8aff905a5a9e9a8cebcd349a93ca3b76db1b52ba1647fa76ef9d3d285c25b0
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-devel-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 572dfaaa95afdb99f9b1c577250ec4a245bba52ed05b9848470d3e282f3374b1
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-libs-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 1530bdb4d6482c48d6119c1de0d392966140903b67711a0da283263587743d11
bind97-utils-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 24380166d08d4930808bdbdbfaa4f0de1de9b1646034021de52bf10296997421
i386
bind97-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 63304fbaeb3edd1f194d59c4bbbd221382aab0e2be261b4f6827b84c2898dcb7
bind97-chroot-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: bac39c8a56dfa5f328c0bdcef4f63250934f99c78e48a72ff09ea2defbbd90c6
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-utils-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 89c341ae74145d55f6725cd51e4bfdeed7c37de846719d740f28e9eeb05393fe

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-10.P2.el5_8.1.src.rpm SHA-256: 1fef9778f19902cb43098123efaa2a27438c66b5e8476744731b4fa5ce96fd14
s390x
bind97-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 4d336b1a29aba8e7fb22db24bae530ee401a71aa248a53af5b01656b14193f83
bind97-chroot-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 5e9be0ae2e24139fa2527954124d8161dc5f65b54db33e626f660c32882a2524
bind97-debuginfo-9.7.0-10.P2.el5_8.1.s390.rpm SHA-256: e15621d1adb37245796c26e49e4289df2a179e92f8eb82c9dae236e36153f8b3
bind97-debuginfo-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 83a30c6d9dbddcb5542d4d521f7e67c92a556494b4fa5ef384cc725273176ad5
bind97-devel-9.7.0-10.P2.el5_8.1.s390.rpm SHA-256: 077e7d46d982777cd6ba65584f0cb6c9864cdbb7f440ec48b9d53794bba87d92
bind97-devel-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 795b6866a9bf8700d24df88815568db613fac833bc16c71c240b36f1d4c06779
bind97-libs-9.7.0-10.P2.el5_8.1.s390.rpm SHA-256: 8e632c9ca7d7aedf91b7b85da56844690af5fc7f5814adfbbd607f286bd569d5
bind97-libs-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 23f117673104603d0d089a29e3689ad051e982da39ec1c2811eae8aa2274f921
bind97-utils-9.7.0-10.P2.el5_8.1.s390x.rpm SHA-256: 7eb787267b5270f45abb8c86ceabf2eef2496b527ef29f0bcfe6690f9290b824

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-10.P2.el5_8.1.src.rpm SHA-256: 1fef9778f19902cb43098123efaa2a27438c66b5e8476744731b4fa5ce96fd14
ppc
bind97-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: 1d676454e2d52d5707a37d7c507f7d1c5c036327f652b6783ee07ab99d104f41
bind97-chroot-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: 1f0d9405d35b6a89f5aa2c85a24d747ca16f7dd1d37e702af80ec75367647f7a
bind97-debuginfo-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: a69159d9b7f48d54be1c73109d78635eab27b63fa0dbaa1cf21d3a31de00379c
bind97-debuginfo-9.7.0-10.P2.el5_8.1.ppc64.rpm SHA-256: a009a849d1fe6a71002c698c6715d196460258381add8945f32144482c831f5d
bind97-devel-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: aa02fe7d47ca9183c94c9865331289d57db46de57e3128f57c7d1651cda18940
bind97-devel-9.7.0-10.P2.el5_8.1.ppc64.rpm SHA-256: f3d95949b5ade3e48970947a54dbb195aa96ee1566374a2694a2f509f1e0e607
bind97-libs-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: af8056700aec9fea5407a6e5be109f5528febc9eae1b7494763e5661e8bd3fd9
bind97-libs-9.7.0-10.P2.el5_8.1.ppc64.rpm SHA-256: 62b2c956f0cc849ed9ffe3020c46e18b1a1368e4dd7cdab300e8993fc0ba1bff
bind97-utils-9.7.0-10.P2.el5_8.1.ppc.rpm SHA-256: d174132d6907474c1fb9ae5edf9e77c4ebbe42d956c91d59f91cbbc198ee2599

Red Hat Enterprise Linux Server from RHUI 5

SRPM
bind97-9.7.0-10.P2.el5_8.1.src.rpm SHA-256: 1fef9778f19902cb43098123efaa2a27438c66b5e8476744731b4fa5ce96fd14
x86_64
bind97-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 35c11c7e243e35672dee5ac8981415a54bd6f39c95a909e109a1e849a2245aff
bind97-chroot-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 3ef7f156a19a29b1ef11ab7f3f36e71c4695c175b22ddeec530d83368bd0390b
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-debuginfo-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 6f8aff905a5a9e9a8cebcd349a93ca3b76db1b52ba1647fa76ef9d3d285c25b0
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-devel-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 572dfaaa95afdb99f9b1c577250ec4a245bba52ed05b9848470d3e282f3374b1
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-libs-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 1530bdb4d6482c48d6119c1de0d392966140903b67711a0da283263587743d11
bind97-utils-9.7.0-10.P2.el5_8.1.x86_64.rpm SHA-256: 24380166d08d4930808bdbdbfaa4f0de1de9b1646034021de52bf10296997421
i386
bind97-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 63304fbaeb3edd1f194d59c4bbbd221382aab0e2be261b4f6827b84c2898dcb7
bind97-chroot-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: bac39c8a56dfa5f328c0bdcef4f63250934f99c78e48a72ff09ea2defbbd90c6
bind97-debuginfo-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: e53fe88bae69dcc8574c4d2dbc8db0628830f6ba94717f6a2326b62a13b7bc46
bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 6907bc8aa4bf2fce7d9e4599e0f07592eed9e4a99f5b39077f83d13ccc850f79
bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 62b75296de12ce2ec3ea7d620823bbdd0b05f1a576745467c9cdf6a7ba48f1cb
bind97-utils-9.7.0-10.P2.el5_8.1.i386.rpm SHA-256: 89c341ae74145d55f6725cd51e4bfdeed7c37de846719d740f28e9eeb05393fe

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility