Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0458 - Security Advisory
Issued:
2016-03-16
Updated:
2016-03-16

RHSA-2016:0458 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: bind97 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind97 packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in the way BIND parsed signature records
for DNAME records. By sending a specially crafted query, a remote attacker
could use this flaw to cause named to crash. (CVE-2016-1286)

A denial of service flaw was found in the way BIND processed certain
control channel input. A remote attacker able to send a malformed packet to
the control channel could use this flaw to cause named to crash.
(CVE-2016-1285)

Red Hat would like to thank ISC for reporting these issues.

All bind97 users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1315674 - CVE-2016-1285 bind: malformed packet sent to rndc can trigger assertion failure
  • BZ - 1315680 - CVE-2016-1286 bind: malformed signature records for DNAME records can trigger assertion failure

CVEs

  • CVE-2016-1286
  • CVE-2016-1285

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://kb.isc.org/article/AA-01352
  • https://kb.isc.org/article/AA-01353
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-21.P2.el5_11.6.src.rpm SHA-256: 59930c5f0b60f712eebf7e1ab004e814cc35e193b5a6fcdf8e67508c379287ce
x86_64
bind97-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 8c0a16501a4b18ef64981188aa1585fbb64009e0074958e7669503247b8cc072
bind97-chroot-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 629c45c71b3354eedfbd4110cb4c289ef4809a36406dbcabf4dcdfdc98130a81
bind97-debuginfo-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 3408bd281a8360eb39e7d0418934db15828cc2ca35348b53d09d564417324a89
bind97-debuginfo-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: a8063a66fb2705cce97dd510837d4516d097432024a04554dc9899c969e92c95
bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: f5a67a8dfc9ff57d30545763257973617f33373a37eea42f9af6d7b38867b757
bind97-devel-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: f2eeae17dfe8aad1dcbddc58bd26daa13de35303a9290d3f48a2766ae1fc1667
bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 6f729c1a2cb1e95fae7145a78de34937e95d33885717639be6cd0ec78b0f31f0
bind97-libs-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 7102f3614e80e2675a18eb3483616b01d5d488633071cbd7c15702fd13f265dd
bind97-utils-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: bd98b53ab8b971f0bddb6d5498629d26d203883ffcd635f1c10417b55125c80a
ia64
bind97-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: c4903b3c83a785e63e5750e5ac761af01a0eefb30d7d12a5dfd1b8597c4f83e9
bind97-chroot-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: fabc09a3e3fc73b408ec5d20d29c151c380633cd25aff4d021bee7660e677f87
bind97-debuginfo-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: 2ed55611ff49d0f689dbd39c5bd65c8563be97f9176f0dd9f062569528213caf
bind97-devel-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: 073076f5b8ee587ddf34f02a0dc09714eb033125e7b260bd291cbcf58bd29b72
bind97-libs-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: 3ed93aeea1c333246f1970c2035d87b587d9d2fe646fe1ed9eb4ae7a60a8ad56
bind97-utils-9.7.0-21.P2.el5_11.6.ia64.rpm SHA-256: eb2881109436d251415c3541ec782526b5fd77376774ff6e498e78e1301997f3
i386
bind97-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 87b3c4367f5dc8808890e9262bbd16a47072453dd9c84611c0b029e8e33621da
bind97-chroot-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: b1203f51e0b1952dd74990faf79698b0676183dba57d633172bcada3bac56d7c
bind97-debuginfo-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 3408bd281a8360eb39e7d0418934db15828cc2ca35348b53d09d564417324a89
bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: f5a67a8dfc9ff57d30545763257973617f33373a37eea42f9af6d7b38867b757
bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 6f729c1a2cb1e95fae7145a78de34937e95d33885717639be6cd0ec78b0f31f0
bind97-utils-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 63073b6c9428064b178061bafe9903d5934d0b102d7793f519beac2668a0312b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-21.P2.el5_11.6.src.rpm SHA-256: 59930c5f0b60f712eebf7e1ab004e814cc35e193b5a6fcdf8e67508c379287ce
s390x
bind97-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: f75359c2f63af9cf8d5dc724960ef981b0fa3e76559038950b40394b204a015a
bind97-chroot-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: 243f8ffea5a29c64862d5946b0a6f93a60304f0b144ee2b2c2cd3e9a0d735766
bind97-debuginfo-9.7.0-21.P2.el5_11.6.s390.rpm SHA-256: 5d87a4298317088abe86c6701861689493949ee6a8703245ca0a79b33a3662f8
bind97-debuginfo-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: 8501bc85da10c1fad91528b3af76c109cb316f65d94e2631fa44d266d70f08f8
bind97-devel-9.7.0-21.P2.el5_11.6.s390.rpm SHA-256: cb51cd0478270edb9c2c5f2a10252dcff2dee4b30305adfb545ca8b8ffb8b13e
bind97-devel-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: 82355559ab687cd8cd0551f7c7e8045ce3019823b0b0d7dfef6fc28c1f5118d3
bind97-libs-9.7.0-21.P2.el5_11.6.s390.rpm SHA-256: d8a784bb28f11d5633afcb17d07a91d3b888c9fc3cb5b8cb96685aaf53151e05
bind97-libs-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: c7bad20ff753aae996d71d61078f0c57177c285f054f663a4717b8a1ef39682e
bind97-utils-9.7.0-21.P2.el5_11.6.s390x.rpm SHA-256: 9b8bd793ebcc267bbf4eb95a84fd87f7dafe66671278045c716856a2b1424895

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-21.P2.el5_11.6.src.rpm SHA-256: 59930c5f0b60f712eebf7e1ab004e814cc35e193b5a6fcdf8e67508c379287ce
ppc
bind97-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: 388d8954fe7c97467a2b9ccd75b501da07213c48cd25793a0e176550722f7b86
bind97-chroot-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: ac26390a3981391807ef4afaa65a58629dd7f944d69262fd060de1839cd89d6f
bind97-debuginfo-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: dd0c5eeeec605482d149c61c64a2a7b871abe5d8a20dd57474c8ec5959b43dd5
bind97-debuginfo-9.7.0-21.P2.el5_11.6.ppc64.rpm SHA-256: 9e3f2aa90435b3554ec2c4566ea04e21be34c402b08a9c271358e7f2f9f53da3
bind97-devel-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: 47b1d02a165dd009123e55eb5900bf142a16ac56763d50713eafc9915ceea5f9
bind97-devel-9.7.0-21.P2.el5_11.6.ppc64.rpm SHA-256: c8d8e02dbdc9677941afa9296c16f8ed8e6e3e26689a6645a0e08f6276de7f2c
bind97-libs-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: 8674da4222c0470eebd999ad7129d8369a7cbca85de88e7c3b5557ff827d1848
bind97-libs-9.7.0-21.P2.el5_11.6.ppc64.rpm SHA-256: ad3c7f2790ab4df262e698930170cd387106223a4033919c9b440ab76d38025a
bind97-utils-9.7.0-21.P2.el5_11.6.ppc.rpm SHA-256: f190b8d09f04b6ce42fe3845e8bd803e56bbd8bcb0b8de07215ccee4766fee49

Red Hat Enterprise Linux Server from RHUI 5

SRPM
bind97-9.7.0-21.P2.el5_11.6.src.rpm SHA-256: 59930c5f0b60f712eebf7e1ab004e814cc35e193b5a6fcdf8e67508c379287ce
x86_64
bind97-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 8c0a16501a4b18ef64981188aa1585fbb64009e0074958e7669503247b8cc072
bind97-chroot-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 629c45c71b3354eedfbd4110cb4c289ef4809a36406dbcabf4dcdfdc98130a81
bind97-debuginfo-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 3408bd281a8360eb39e7d0418934db15828cc2ca35348b53d09d564417324a89
bind97-debuginfo-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: a8063a66fb2705cce97dd510837d4516d097432024a04554dc9899c969e92c95
bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: f5a67a8dfc9ff57d30545763257973617f33373a37eea42f9af6d7b38867b757
bind97-devel-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: f2eeae17dfe8aad1dcbddc58bd26daa13de35303a9290d3f48a2766ae1fc1667
bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 6f729c1a2cb1e95fae7145a78de34937e95d33885717639be6cd0ec78b0f31f0
bind97-libs-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: 7102f3614e80e2675a18eb3483616b01d5d488633071cbd7c15702fd13f265dd
bind97-utils-9.7.0-21.P2.el5_11.6.x86_64.rpm SHA-256: bd98b53ab8b971f0bddb6d5498629d26d203883ffcd635f1c10417b55125c80a
i386
bind97-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 87b3c4367f5dc8808890e9262bbd16a47072453dd9c84611c0b029e8e33621da
bind97-chroot-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: b1203f51e0b1952dd74990faf79698b0676183dba57d633172bcada3bac56d7c
bind97-debuginfo-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 3408bd281a8360eb39e7d0418934db15828cc2ca35348b53d09d564417324a89
bind97-devel-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: f5a67a8dfc9ff57d30545763257973617f33373a37eea42f9af6d7b38867b757
bind97-libs-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 6f729c1a2cb1e95fae7145a78de34937e95d33885717639be6cd0ec78b0f31f0
bind97-utils-9.7.0-21.P2.el5_11.6.i386.rpm SHA-256: 63073b6c9428064b178061bafe9903d5934d0b102d7793f519beac2668a0312b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility