Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0074 - Security Advisory
Issued:
2016-01-27
Updated:
2016-01-27

RHSA-2016:0074 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: bind97 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind97 packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in the way BIND processed certain
malformed Address Prefix List (APL) records. A remote, authenticated
attacker could use this flaw to cause named to crash. (CVE-2015-8704)

Red Hat would like to thank ISC for reporting this issue.

All bind97 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1299364 - CVE-2015-8704 bind: specific APL data could trigger an INSIST in apl_42.c

CVEs

  • CVE-2015-8704

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://kb.isc.org/article/AA-01335
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-21.P2.el5_11.5.src.rpm SHA-256: 8a1c10e5766f0a445735c763b9bbebc22c4c81a4a7f7fc135c7bebf3bacb0009
x86_64
bind97-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 3815096e30fbe1ac85371f6a298ee15d3a7b458b2c68c77ab02139114c888b5c
bind97-chroot-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 339f0fbe78d140ca81179d7f6c4631567227265ae70cf90fcd8bbc953fe643f6
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-debuginfo-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: b78520999c08f0267ed8268ea91138df8e6d46c44e00bda86705a468886b8a71
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-devel-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e867419ff62d0a5e83a28f48006aaaf553a3fbca5080138bc75d3c0dd873e95e
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-libs-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: f08a42fd39215c685a3fd7e110d0d6f4fff768d03152867e2f11ff7fd2ad7b5d
bind97-utils-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e46f59d5ae01957eadaf8146a09c98559e5e9999905a88e28168b388e09b1b5b
ia64
bind97-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: 8aec0258409a164fb641321e98413f757e51104117777d86d343fdfd17cdf474
bind97-chroot-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: d74fedaf20a91704a229471f6c0c4aef7714d858cb038fab21980173c0bc11f4
bind97-debuginfo-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: 6727f48fbf279393b03c4f82f8ab43208a50590f3d15f02c71d50958ef91d761
bind97-devel-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: 917f374da5cf901d1afbaa1d837e8e30bfa34c7a7e55407a0e5035552638b9c2
bind97-libs-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: 5d7838748fceb521b9d8fe7292e652e405e800a17e40b24609d56520cdfd1bdb
bind97-utils-9.7.0-21.P2.el5_11.5.ia64.rpm SHA-256: dc65804d47dbd6a1eefc4d268d4ce381b99dfc52bd445789a136a5d90bad4600
i386
bind97-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 5bd9029cf5119b82f022ba1967f0db3f327e79072b26ff3cc6bff0c87a76dbc4
bind97-chroot-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: f47aa58a2e4bcdd4d82c5d30aab1f720f70a47aed445c0df003419d2eaf668b1
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-utils-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 0a5acd9d7e9bbf3a59dea8a01a9b654e002d48aeb7854c47f8fa482c901594b4

Red Hat Enterprise Linux Workstation 5

SRPM
bind97-9.7.0-21.P2.el5_11.5.src.rpm SHA-256: 8a1c10e5766f0a445735c763b9bbebc22c4c81a4a7f7fc135c7bebf3bacb0009
x86_64
bind97-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 3815096e30fbe1ac85371f6a298ee15d3a7b458b2c68c77ab02139114c888b5c
bind97-chroot-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 339f0fbe78d140ca81179d7f6c4631567227265ae70cf90fcd8bbc953fe643f6
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-debuginfo-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: b78520999c08f0267ed8268ea91138df8e6d46c44e00bda86705a468886b8a71
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-devel-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e867419ff62d0a5e83a28f48006aaaf553a3fbca5080138bc75d3c0dd873e95e
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-libs-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: f08a42fd39215c685a3fd7e110d0d6f4fff768d03152867e2f11ff7fd2ad7b5d
bind97-utils-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e46f59d5ae01957eadaf8146a09c98559e5e9999905a88e28168b388e09b1b5b
i386
bind97-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 5bd9029cf5119b82f022ba1967f0db3f327e79072b26ff3cc6bff0c87a76dbc4
bind97-chroot-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: f47aa58a2e4bcdd4d82c5d30aab1f720f70a47aed445c0df003419d2eaf668b1
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-utils-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 0a5acd9d7e9bbf3a59dea8a01a9b654e002d48aeb7854c47f8fa482c901594b4

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-21.P2.el5_11.5.src.rpm SHA-256: 8a1c10e5766f0a445735c763b9bbebc22c4c81a4a7f7fc135c7bebf3bacb0009
s390x
bind97-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: 48a15180d17b39d497f73fa25f7d8bc380ff0515809ef9140b2f10665e16c294
bind97-chroot-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: dd395bbc713a1f8de3fe270c0b29a0d13633ecdd4b75a50c5df4232d30feba5f
bind97-debuginfo-9.7.0-21.P2.el5_11.5.s390.rpm SHA-256: 7e8de19aec6c22d903d2ab355521030995f01ed324691a509c8f28f620533051
bind97-debuginfo-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: cf2f2ca88cfc8945d1ccbccc09633544e0f59066603f11577489d62bf376e3e3
bind97-devel-9.7.0-21.P2.el5_11.5.s390.rpm SHA-256: 60c4493252bca7b784f670fae9a6cf00e889d2e618dcb0b84c0a5dd37410534b
bind97-devel-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: fd1c8cdce54a9105d0518897a8202b61bf62d0bf3ee247ebd3398cd9d609ffbb
bind97-libs-9.7.0-21.P2.el5_11.5.s390.rpm SHA-256: 369cc161278a21a0172431d894bb0de99a76ce0d17c78e6fcbd7e60164839991
bind97-libs-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: 6f4f6536c5ffa6061abc8e2768daf02470ca29a1f8ce56d3aed1f485fd72cdce
bind97-utils-9.7.0-21.P2.el5_11.5.s390x.rpm SHA-256: 125d1d07b2da4dff4fb449f8ccc4f0de2dac617ffc67ef76ecbf42a6998e6500

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-21.P2.el5_11.5.src.rpm SHA-256: 8a1c10e5766f0a445735c763b9bbebc22c4c81a4a7f7fc135c7bebf3bacb0009
ppc
bind97-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: 07fa52c920e4600b749c7945c4ac0b8a7bfa598bb8795b5fee4dd27a1c0dcb29
bind97-chroot-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: 29505af142d8f284a9c13a184bec7d692a3bf196a30263c388ca004c88bde2f5
bind97-debuginfo-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: 66b003b66c1177b541e107b36ef1b4c38a6dcc720a777418d9e4daf151ed362b
bind97-debuginfo-9.7.0-21.P2.el5_11.5.ppc64.rpm SHA-256: 97bafa76a43bb4b355876111141d888ad676615d1193003df71af67842de7dc4
bind97-devel-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: b23493b96a473241572ec0b602f7ab40bc3ebb72c5da411d7679f6728468a11a
bind97-devel-9.7.0-21.P2.el5_11.5.ppc64.rpm SHA-256: 96e99bbfa3afe0baf0514cb766ee1adccd8ab5f504115150b5ae07fe98211aa5
bind97-libs-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: d2d106781eaac322c0c0a4c3566dd100812f925e5195479b4895e40c5655ba83
bind97-libs-9.7.0-21.P2.el5_11.5.ppc64.rpm SHA-256: 371d3682eafb32d0e1e038662e061fdf9c45ec2a830e59847082a02ef0afb358
bind97-utils-9.7.0-21.P2.el5_11.5.ppc.rpm SHA-256: 2662539b6640871252a41b8c0b515df7db5503281e574d12702d457a3dfe446b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
bind97-9.7.0-21.P2.el5_11.5.src.rpm SHA-256: 8a1c10e5766f0a445735c763b9bbebc22c4c81a4a7f7fc135c7bebf3bacb0009
x86_64
bind97-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 3815096e30fbe1ac85371f6a298ee15d3a7b458b2c68c77ab02139114c888b5c
bind97-chroot-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: 339f0fbe78d140ca81179d7f6c4631567227265ae70cf90fcd8bbc953fe643f6
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-debuginfo-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: b78520999c08f0267ed8268ea91138df8e6d46c44e00bda86705a468886b8a71
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-devel-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e867419ff62d0a5e83a28f48006aaaf553a3fbca5080138bc75d3c0dd873e95e
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-libs-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: f08a42fd39215c685a3fd7e110d0d6f4fff768d03152867e2f11ff7fd2ad7b5d
bind97-utils-9.7.0-21.P2.el5_11.5.x86_64.rpm SHA-256: e46f59d5ae01957eadaf8146a09c98559e5e9999905a88e28168b388e09b1b5b
i386
bind97-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 5bd9029cf5119b82f022ba1967f0db3f327e79072b26ff3cc6bff0c87a76dbc4
bind97-chroot-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: f47aa58a2e4bcdd4d82c5d30aab1f720f70a47aed445c0df003419d2eaf668b1
bind97-debuginfo-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 7253041ec7bfcd61bb80bfc61e7321bea5ead9f38ba0f33c4b8af4d831d37af2
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 99106cdf3cfc674f7689c79a9b4d8691d81acf0f4412fd99e18143df405daef9
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 24f70be039a13ad26183b7be625752ddb7422dcaea1243505b9faec831521379
bind97-utils-9.7.0-21.P2.el5_11.5.i386.rpm SHA-256: 0a5acd9d7e9bbf3a59dea8a01a9b654e002d48aeb7854c47f8fa482c901594b4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility