Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:1945 - Security Advisory
Issued:
2016-09-28
Updated:
2016-09-28

RHSA-2016:1945 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: bind97 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for bind97 is now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for
verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND constructed a response to a

query that met certain criteria. A remote attacker could use this flaw to make
named exit unexpectedly with an assertion failure via a specially crafted DNS
request packet. (CVE-2016-2776)

Red Hat would like to thank ISC for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, the BIND daemon (named) will be restarted
automatically.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc

Fixes

  • BZ - 1378380 - CVE-2016-2776 bind: assertion failure in buffer.c while building responses to a specifically constructed request

CVEs

  • CVE-2016-2776

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://kb.isc.org/article/AA-01419
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-21.P2.el5_11.7.src.rpm SHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
x86_64
bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: f1fd5e5c7c6f9819ba78f50a7a157fcfe475b85360009c0abf2e5e4ab17170a6
bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: d210d496d52938ac9ead7ab9477b5dedbb51be81f172e9343f253d88d2bdcaef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: a07ad0c8af4e343c5c83f8ac86305630320a8701e2c2b5d610feb62bd79d3b10
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: 5abe2afbdeb87da34aa6d34a96baea76713a95b07bcee0098fbac9e683fed68f
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: ab03b45fae69896cb2767979a0670aa5b7a09f64c1dac6edde5c98bd4e5e1fa9
bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: 30a85bc81352d7121bce0cb1ef580e339c9e56f916605531db470215c835f323
ia64
bind97-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: f7efe5a89651a76ecf5a9cc168183f887853a352452e1e00adf3691d0856914f
bind97-chroot-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: 686f84127bc6f1d04ec9446f35cde55112113c3835529e34d1b1974e81e17046
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: b30f8ede6f2f5be7ebdfdc5274675ca835b7986e2b38516a7c627b391f342b9a
bind97-devel-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: dae04826d06deaec873a1e9ff07fd13fd0329187f1c29091579c0d427659e4c1
bind97-libs-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: 729d0defc7c918d0e6b42c82eaeba6032e7a63417c626d4719e17c3a9310549b
bind97-utils-9.7.0-21.P2.el5_11.7.ia64.rpm SHA-256: 0eb742dc1d761dfe772733c2fbb0c1e091d380869c155c5522f6e49913c9bc3e
i386
bind97-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 7472de1caa798c63ada40aad338137be25ba405e6b9ba7f9a81564172c7caccb
bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 322b78dda5d22e0504eabea3f26cd5ed60e99baff6e5a27bd71222fbe036c9df
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 8f66c5898279f3dd9a92b60c0c27ac321e2b8ba851519036e46389baf591cae7

Red Hat Enterprise Linux Workstation 5

SRPM
bind97-9.7.0-21.P2.el5_11.7.src.rpm SHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
x86_64
bind97-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: f1fd5e5c7c6f9819ba78f50a7a157fcfe475b85360009c0abf2e5e4ab17170a6
bind97-chroot-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: d210d496d52938ac9ead7ab9477b5dedbb51be81f172e9343f253d88d2bdcaef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-debuginfo-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: a07ad0c8af4e343c5c83f8ac86305630320a8701e2c2b5d610feb62bd79d3b10
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-devel-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: 5abe2afbdeb87da34aa6d34a96baea76713a95b07bcee0098fbac9e683fed68f
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-libs-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: ab03b45fae69896cb2767979a0670aa5b7a09f64c1dac6edde5c98bd4e5e1fa9
bind97-utils-9.7.0-21.P2.el5_11.7.x86_64.rpm SHA-256: 30a85bc81352d7121bce0cb1ef580e339c9e56f916605531db470215c835f323
i386
bind97-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 7472de1caa798c63ada40aad338137be25ba405e6b9ba7f9a81564172c7caccb
bind97-chroot-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 322b78dda5d22e0504eabea3f26cd5ed60e99baff6e5a27bd71222fbe036c9df
bind97-debuginfo-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 6b24ee2cdd7c64e6f1a5f1f337eb914242ca24f051fe54458bcd3de8f36912a9
bind97-devel-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 628a966c14e0fb233b8b196a7f7847088cec0eba4f86facbdd70062ede6aa807
bind97-libs-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 32838f7dbb50ecfac925bbe838c88369177d15d67cb7764f76c2e715c8924435
bind97-utils-9.7.0-21.P2.el5_11.7.i386.rpm SHA-256: 8f66c5898279f3dd9a92b60c0c27ac321e2b8ba851519036e46389baf591cae7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-21.P2.el5_11.7.src.rpm SHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
s390x
bind97-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: a0054a2f2d54beda63dc4a6035d4cc1260bac84c04962c15e81cc9a67bad33af
bind97-chroot-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: fda1c0c950e0189395323889c5c98c73c86203a78963b2be7b614ae82aaf31f3
bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390.rpm SHA-256: 0f7c5709e3ae6f37ca8367b69c4df53ffea83124e408aff3283a3a9381ebd29f
bind97-debuginfo-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: 995476d30b5d202d66962fa45954fc97650a2e31b04fb1a23658305b96a3f3e8
bind97-devel-9.7.0-21.P2.el5_11.7.s390.rpm SHA-256: 63fe50ebdcedd49f2ac7242fd59e539221c1e76683ae91fddbc37e4897415284
bind97-devel-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: 0bc56058b5f914273d9203a38e53a32071278218668716a7cc316738fbfc4124
bind97-libs-9.7.0-21.P2.el5_11.7.s390.rpm SHA-256: f569fe62ddee42ba28376cd4eef7296ad504af58163363a2fbc11ef8ab4eba17
bind97-libs-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: 8995b89ac80f3f6d7793ad8427488541e077e12efa2afcb8ce06bbcf6bb325b4
bind97-utils-9.7.0-21.P2.el5_11.7.s390x.rpm SHA-256: 1ca967ff2a5f279235ca40d23ff22141daf618271182c30d325f2e2693cab36d

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-21.P2.el5_11.7.src.rpm SHA-256: 974ce163b1c9a32f5bc13c794ce7c384099635c9e7fd69972fa60679031b4e1f
ppc
bind97-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: 4af44ba68c66022fd732e2ef36bc14c9e1ddffa88ac32c3fad62904669582269
bind97-chroot-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: 2caa0695e99188e0b0800a047cfc20886b1cff5838aa2452a00a599aa13f9cef
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: 47f298eff0910ca4ce637611d6575fd883a22b65ef633b3d1cab7a23d7f8f9e7
bind97-debuginfo-9.7.0-21.P2.el5_11.7.ppc64.rpm SHA-256: 8c2a2a5d043031bc533746e1ebed5214a24c7df7d2592626cb403c9c6a1185a4
bind97-devel-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: bd2538ee3be8eed45607adc561e27fc8bd9fcdea6b3524ee4279223362b9d593
bind97-devel-9.7.0-21.P2.el5_11.7.ppc64.rpm SHA-256: 8a8dc336900a08ea151765b5bf334cd5e37f2908dd8eb3182fdbac273d3327fb
bind97-libs-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: b4e342e8374d00a2a5f8300ef158e000a7b369c8bd0060ac8d7bd518938253d4
bind97-libs-9.7.0-21.P2.el5_11.7.ppc64.rpm SHA-256: 987305a328242bb3ba8e76c16de0220100d0ca02ee17b73580164e49a69c500a
bind97-utils-9.7.0-21.P2.el5_11.7.ppc.rpm SHA-256: 2d6804ef50fddae72985b1f69afab6a9148f1ac2af3683e91046547a39b5e9b9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility