Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:0064 - Security Advisory
Issued:
2017-01-16
Updated:
2017-01-16

RHSA-2017:0064 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: bind97 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for bind97 is now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for
verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND handled a query response

containing inconsistent DNSSEC information. A remote attacker could use this
flaw to make named exit unexpectedly with an assertion failure via a specially
crafted DNS response. (CVE-2016-9147)

Red Hat would like to thank ISC for reporting this issue.

Solution

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, the BIND daemon (named) will be restarted
automatically.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc

Fixes

  • BZ - 1411367 - CVE-2016-9147 bind: assertion failure while handling a query response containing inconsistent DNSSEC information

CVEs

  • CVE-2016-9147

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://kb.isc.org/article/AA-01440
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind97-9.7.0-21.P2.el5_11.10.src.rpm SHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
x86_64
bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 98dc796069d5aabb624ffe2d1a2a45d639cc6051397adc05c7af9a32fde5a7b0
bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 27f1d2b557dac6e1a299a35fed36213ff4d4334fd692964856058917b96d0a20
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 61ccdfeba11bf279c3e0cf5848efddf3e68fb20473d1142532071a2cce484423
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 10a5f680dc4f28539dd603129ce10122844080fedc1e5347ec2a39ab9e804577
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: c245aa94dde45616a8b07424c17c3329dbb6d16e384b2675926dc51546965e1e
bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 7703f33bf6aebcc6413e2797429859ea74791ca764206f24deccaeb1b6802935
ia64
bind97-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: 25fc1af1d36945d2a66bc7d6679aff650fde3aec2c510986a6146be7eac0b19c
bind97-chroot-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: 321d12a4bd0e94c1860ef3fe2cfc1901b74774f116d5f7a51e7b7a99e17ffe22
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: 55dfbf9e07267587a83eaa475c8832ed95b23dc34fd299c1f25af212fd8af2cc
bind97-devel-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: 8d8fb997d805b76a48ac9dc2163e3b8416b60b6d4c4c6d745939daadb404d58f
bind97-libs-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: be436a3cffa3ef9a68c7839acc4dda510f24761878d91b483be2115b8846b0a3
bind97-utils-9.7.0-21.P2.el5_11.10.ia64.rpm SHA-256: 26122f16acda45688bfdcb7549040c8b6e27ffe2c65982995b83809161409f0a
i386
bind97-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: bd154f2d6aeda14322634dc1bd1c99b15ff594ff870cbdcbb55ca6b0ef0f4d1a
bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: b32478f126dd5c40666d83dab756c0ff8c90eacfa48416ad623f2f676619d09f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: a8938654bc64386bfeb3d9e0ac777b6259881ef03c80cac73a914d1c9f2f9fce

Red Hat Enterprise Linux Workstation 5

SRPM
bind97-9.7.0-21.P2.el5_11.10.src.rpm SHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
x86_64
bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 98dc796069d5aabb624ffe2d1a2a45d639cc6051397adc05c7af9a32fde5a7b0
bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 27f1d2b557dac6e1a299a35fed36213ff4d4334fd692964856058917b96d0a20
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 61ccdfeba11bf279c3e0cf5848efddf3e68fb20473d1142532071a2cce484423
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 10a5f680dc4f28539dd603129ce10122844080fedc1e5347ec2a39ab9e804577
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: c245aa94dde45616a8b07424c17c3329dbb6d16e384b2675926dc51546965e1e
bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm SHA-256: 7703f33bf6aebcc6413e2797429859ea74791ca764206f24deccaeb1b6802935
i386
bind97-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: bd154f2d6aeda14322634dc1bd1c99b15ff594ff870cbdcbb55ca6b0ef0f4d1a
bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: b32478f126dd5c40666d83dab756c0ff8c90eacfa48416ad623f2f676619d09f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 1454839372f144b27555a8fb931886c386766262601f1cad6e852b8f22010f8c
bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 8419b598282aecc1d70b96c0d49eb6063524eccab51ca304d8b10417e82f8cb4
bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: 9db3a2904ae4636e5f035529737efecb6f63f3ca62b2f2e90115c1c78e48936a
bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm SHA-256: a8938654bc64386bfeb3d9e0ac777b6259881ef03c80cac73a914d1c9f2f9fce

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind97-9.7.0-21.P2.el5_11.10.src.rpm SHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
s390x
bind97-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: b5704420b946672b7e7e06918437b47011328b7fa892981aebbc1ce47cb91e75
bind97-chroot-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: 4a70e173e10ed269ba164840c01469038b031458a0fa4e30fe4b9cc5f4e3676f
bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390.rpm SHA-256: 72bf17e09c333da1a9a74f6e2c83c49c4507b0fffdb03ddcc3e671fce5f907ee
bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: 3c5814053c62cad73796906d52da1c944373ad843433bf9a241c9051bb1542db
bind97-devel-9.7.0-21.P2.el5_11.10.s390.rpm SHA-256: 753c912b2aa982a999a26ff1aac596b4ecf95eb86ac3270e463fd74ab98b7bed
bind97-devel-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: ad58c39179557f248bec55d0f491d174b5903a2405c6ba01d18e471bf93b89e7
bind97-libs-9.7.0-21.P2.el5_11.10.s390.rpm SHA-256: afd0ae8e5827b456eb283574dc7b58d0db8dd2ecaa22b5ace7ada254ff4ed426
bind97-libs-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: 5455ee4ceee38603de5d610309e86289c1729216d16c225528aca5a42ac731bd
bind97-utils-9.7.0-21.P2.el5_11.10.s390x.rpm SHA-256: 83c8e2eaf5af241fb6e1526b433d460f124dded2f6b5d2d26e7552bea8cf0b44

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind97-9.7.0-21.P2.el5_11.10.src.rpm SHA-256: 2b16142fd887435ca267a8d94357c11193af9d8cf6930b24901759b1bc93e783
ppc
bind97-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: be87c2d9ead10483e43b6c9da98d32be4ddae3f14997a2184e330990b171f333
bind97-chroot-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: 45edf52af0598425ef54664086dd707db2eea15d47afa28fea2b7aa6f0321083
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: aff7692b448499961de5cbf0eea8a6fb81c34fde4597eec296072330220e68a7
bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc64.rpm SHA-256: 6376430483939d7ad0db97a8a1156d9c72064d594a600c21d4f88eebc1d33b89
bind97-devel-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: 109f6f0f16fb15662d8907304b0877582b9fe45591b4dcb150ae457b596c89d5
bind97-devel-9.7.0-21.P2.el5_11.10.ppc64.rpm SHA-256: 510c1baab39761e1a1a88970387070de44b76d5af1acaf2fdd9016f243c83023
bind97-libs-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: f8d918fc48bfb0130a9ad55f108f97b4cae0ca86e5b1b6d094736b5c52374d52
bind97-libs-9.7.0-21.P2.el5_11.10.ppc64.rpm SHA-256: d99d84935331b95576165bc1d31078374bcfa95f486527761008225abb50fc84
bind97-utils-9.7.0-21.P2.el5_11.10.ppc.rpm SHA-256: 26df5b626946642c8c3b921de452caf17f8571e8606144f7571aed1fc6fb0f06

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility