Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:1244 - Security Advisory
Issued:
2014-09-16
Updated:
2014-09-16

RHSA-2014:1244 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: bind97 security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind97 packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. It contains a DNS server (named), a resolver
library with routines for applications to use when interfacing with DNS,
and tools for verifying that the DNS server is operating correctly.
These packages contain version 9.7 of the BIND suite.

A denial of service flaw was found in the way BIND handled queries for
NSEC3-signed zones. A remote attacker could use this flaw against an
authoritative name server that served NCES3-signed zones by sending a
specially crafted query, which, when processed, would cause named to crash.
(CVE-2014-0591)

Note: The CVE-2014-0591 issue does not directly affect the version of
bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed
however to assure it is not introduced in future builds of bind97 (possibly
built with a different compiler or C library optimization).

This update also fixes the following bug:

  • Previously, the bind97 initscript did not check for the existence of the

ROOTDIR variable when shutting down the named daemon. As a consequence,
some parts of the file system that are mounted when using bind97 in a
chroot environment were unmounted on daemon shut down, even if bind97 was
not running in a chroot environment. With this update, the initscript has
been fixed to check for the existence of the ROOTDIR variable when
unmounting some parts of the file system on named daemon shut down. Now,
when shutting down bind97 that is not running in a chroot environment, no
parts of the file system are unmounted. (BZ#1059118)

All bind97 users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1051717 - CVE-2014-0591 bind: named crash when handling malformed NSEC3-signed zones

CVEs

  • CVE-2014-0591

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-21.P2.el5.src.rpm SHA-256: aafeed548e7d4314b0c4c1ed7ea52e617e201b0a10db31c69324d5d6367c5106
x86_64
bind97-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 85698a3c944d0a9910891ae8fbf0a29a6baff8acee5e24f9e071d7cc737d572a
bind97-chroot-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 4003d1b48cb55d6f82dad5e52f3681347c3af60204402396e81e6009222262ff
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-debuginfo-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 6283f8145d148b19ccd2ed2e964660f0ea4bd351b3ab5a339962aed82817d8b1
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-devel-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 95b58966bfabfd992f476da79c41e434bb8a4da8867fac38d87e40c0a10b4b72
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-libs-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 10042a72db6b0be6e82974442cc3ca55e2b9a18c086f28b7b4de95fce1982207
bind97-utils-9.7.0-21.P2.el5.x86_64.rpm SHA-256: f42d74fa1ff8512b69f27500c030da676b795102599a349ae6aeed10cf21a5bf
ia64
bind97-9.7.0-21.P2.el5.ia64.rpm SHA-256: 14e27b01767117afc3327da70eb9e1207ed785294c483c5727e1d4ac3417ac42
bind97-chroot-9.7.0-21.P2.el5.ia64.rpm SHA-256: 3dea277e97dd2b5197537fe1dd6289a797c7fe2a5fa02b5d505c04e9ed12fbe4
bind97-debuginfo-9.7.0-21.P2.el5.ia64.rpm SHA-256: f55a39644ef2589aed304375e95672d151f9891f0d2d93b818926d4e82f49b2d
bind97-devel-9.7.0-21.P2.el5.ia64.rpm SHA-256: 9b5989639b7c40223f603c5e3ac1e3a65fc770539d2a514170301d3639d065f1
bind97-libs-9.7.0-21.P2.el5.ia64.rpm SHA-256: 860df4b1a4f50c3d2f19902e4530ba54afc68554b9a169e48c202944553dab89
bind97-utils-9.7.0-21.P2.el5.ia64.rpm SHA-256: 1b0b342a52f064f1d6de3c7120a929080b34609aa7d41652a96b68086284d60c
i386
bind97-9.7.0-21.P2.el5.i386.rpm SHA-256: 46dfaee33373efffc276841afe351f6b736975120a406c9870790b7499e7d01f
bind97-chroot-9.7.0-21.P2.el5.i386.rpm SHA-256: fbce22aa57680f9c4ca8e4a6cb41c3e0953d89a09720c719326077f9c927551a
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-utils-9.7.0-21.P2.el5.i386.rpm SHA-256: d3297881d881a52f2a4f5200a0597d80a188124ce29bddd9e1b36f780ef9377c

Red Hat Enterprise Linux Workstation 5

SRPM
bind97-9.7.0-21.P2.el5.src.rpm SHA-256: aafeed548e7d4314b0c4c1ed7ea52e617e201b0a10db31c69324d5d6367c5106
x86_64
bind97-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 85698a3c944d0a9910891ae8fbf0a29a6baff8acee5e24f9e071d7cc737d572a
bind97-chroot-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 4003d1b48cb55d6f82dad5e52f3681347c3af60204402396e81e6009222262ff
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-debuginfo-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 6283f8145d148b19ccd2ed2e964660f0ea4bd351b3ab5a339962aed82817d8b1
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-devel-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 95b58966bfabfd992f476da79c41e434bb8a4da8867fac38d87e40c0a10b4b72
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-libs-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 10042a72db6b0be6e82974442cc3ca55e2b9a18c086f28b7b4de95fce1982207
bind97-utils-9.7.0-21.P2.el5.x86_64.rpm SHA-256: f42d74fa1ff8512b69f27500c030da676b795102599a349ae6aeed10cf21a5bf
i386
bind97-9.7.0-21.P2.el5.i386.rpm SHA-256: 46dfaee33373efffc276841afe351f6b736975120a406c9870790b7499e7d01f
bind97-chroot-9.7.0-21.P2.el5.i386.rpm SHA-256: fbce22aa57680f9c4ca8e4a6cb41c3e0953d89a09720c719326077f9c927551a
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-utils-9.7.0-21.P2.el5.i386.rpm SHA-256: d3297881d881a52f2a4f5200a0597d80a188124ce29bddd9e1b36f780ef9377c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-21.P2.el5.src.rpm SHA-256: aafeed548e7d4314b0c4c1ed7ea52e617e201b0a10db31c69324d5d6367c5106
s390x
bind97-9.7.0-21.P2.el5.s390x.rpm SHA-256: edd926f3c2cd9f1c70e951da0f01cb0be605f5154aff437a186729d56e5f264f
bind97-chroot-9.7.0-21.P2.el5.s390x.rpm SHA-256: 75328f50fc1f30d6bf3f91c5c6e8c933d082b8189a791b687f0dd304e9a33bf7
bind97-debuginfo-9.7.0-21.P2.el5.s390.rpm SHA-256: aaee8ec44965563d98f7ae17ebc26da0b858ae34414301a763833d4ef6136ff1
bind97-debuginfo-9.7.0-21.P2.el5.s390x.rpm SHA-256: 8f5d6a60a42e0ca33a48f3f8d49102ef4146e52803c77e77e86fd55faa5f3dd5
bind97-devel-9.7.0-21.P2.el5.s390.rpm SHA-256: 4673c339e45afbb6cb4812fab5bbce09594d9457707089e0614e859ce2ac2c01
bind97-devel-9.7.0-21.P2.el5.s390x.rpm SHA-256: 654d7ea2df0445d096724d9d53648408575241ae67a2430df32538490b9fc8e7
bind97-libs-9.7.0-21.P2.el5.s390.rpm SHA-256: 856b04ea1bd5648ebf0c6bdb4f0b82fbff72f8821738bc71e57f6f8f34329ff8
bind97-libs-9.7.0-21.P2.el5.s390x.rpm SHA-256: 97b9db050d047c5093f5e2cbb05531151e1e0599c576bf188f5462e575a7c9f7
bind97-utils-9.7.0-21.P2.el5.s390x.rpm SHA-256: 6be8275e7f86025dc7ebd6aee093d6ed020e408aea3f57b6f0e3254fbd8f8325

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-21.P2.el5.src.rpm SHA-256: aafeed548e7d4314b0c4c1ed7ea52e617e201b0a10db31c69324d5d6367c5106
ppc
bind97-9.7.0-21.P2.el5.ppc.rpm SHA-256: a4cfba1018106740aa20839c4178aba0431f53acbd49728d73d13b99fc4480e4
bind97-chroot-9.7.0-21.P2.el5.ppc.rpm SHA-256: 275d5094826f0d0efc0c35c24600cf6824415fdaeb0be57dea3f8bbfc4b0058d
bind97-debuginfo-9.7.0-21.P2.el5.ppc.rpm SHA-256: 917373e18d2722d77898844da737b713f764eeb7cf4bfb3902bf5d70a6d6eb3c
bind97-debuginfo-9.7.0-21.P2.el5.ppc64.rpm SHA-256: 6acc06c0d1c0d628dd04246e5842ed151f7c4fbcbd9c1dc306334d76c77031ca
bind97-devel-9.7.0-21.P2.el5.ppc.rpm SHA-256: 8ea5eaf7850525e245f623b57d3b29b7c80748db7f1965db91ba6b9ce0b455f5
bind97-devel-9.7.0-21.P2.el5.ppc64.rpm SHA-256: 5dd8f43e89a66855238ce685b554c7610f2bd488b208edce2ff626691d68afcc
bind97-libs-9.7.0-21.P2.el5.ppc.rpm SHA-256: 2ce66e20927c0f755940606f293eb627d637cbe1d939bc04e723b43477d55ddf
bind97-libs-9.7.0-21.P2.el5.ppc64.rpm SHA-256: 3f4f30e21268c49382b39ead0d2d398d144f152ad73a1fd2f2a2b9db95188b39
bind97-utils-9.7.0-21.P2.el5.ppc.rpm SHA-256: 6669e61a287bc47248e31fe8de8ce59ad2330dd5cdf578be0c22227edfe5b833

Red Hat Enterprise Linux Server from RHUI 5

SRPM
bind97-9.7.0-21.P2.el5.src.rpm SHA-256: aafeed548e7d4314b0c4c1ed7ea52e617e201b0a10db31c69324d5d6367c5106
x86_64
bind97-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 85698a3c944d0a9910891ae8fbf0a29a6baff8acee5e24f9e071d7cc737d572a
bind97-chroot-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 4003d1b48cb55d6f82dad5e52f3681347c3af60204402396e81e6009222262ff
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-debuginfo-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 6283f8145d148b19ccd2ed2e964660f0ea4bd351b3ab5a339962aed82817d8b1
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-devel-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 95b58966bfabfd992f476da79c41e434bb8a4da8867fac38d87e40c0a10b4b72
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-libs-9.7.0-21.P2.el5.x86_64.rpm SHA-256: 10042a72db6b0be6e82974442cc3ca55e2b9a18c086f28b7b4de95fce1982207
bind97-utils-9.7.0-21.P2.el5.x86_64.rpm SHA-256: f42d74fa1ff8512b69f27500c030da676b795102599a349ae6aeed10cf21a5bf
i386
bind97-9.7.0-21.P2.el5.i386.rpm SHA-256: 46dfaee33373efffc276841afe351f6b736975120a406c9870790b7499e7d01f
bind97-chroot-9.7.0-21.P2.el5.i386.rpm SHA-256: fbce22aa57680f9c4ca8e4a6cb41c3e0953d89a09720c719326077f9c927551a
bind97-debuginfo-9.7.0-21.P2.el5.i386.rpm SHA-256: 87f7ec56f12f18d82c370a6023459b3c629ecf805d069a23b33db36816c71246
bind97-devel-9.7.0-21.P2.el5.i386.rpm SHA-256: 29f64b5cdc06b019468ffab5bf4a469dddea31dd7a5e2c92826bbd02a6b3a33f
bind97-libs-9.7.0-21.P2.el5.i386.rpm SHA-256: 0e913624f55ebd0598088ca27922f522870973ca51c3f7809b7d590b49a0f829
bind97-utils-9.7.0-21.P2.el5.i386.rpm SHA-256: d3297881d881a52f2a4f5200a0597d80a188124ce29bddd9e1b36f780ef9377c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility