Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4332: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: bind security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for bind is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • bind: named’s configured cache size limit can be significantly exceeded (CVE-2023-2828)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, the BIND daemon (named) will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2216227 - CVE-2023-2828 bind: named’s configured cache size limit can be significantly exceeded

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

bind-9.11.26-4.el8_4.2.src.rpm

SHA-256: 91a5ff71daeaf7edcbdc2e277d86b42b0062fe2f07c95d1c7cb3c67116a801b8

x86_64

bind-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 2ca1eae186f6e283910fd1507f3605ee332559ee3ad25ffb0a66da4bb23c3434

bind-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: ebe06675d23353cc2df5abba577328eca12d885c97b899415e64cf99e8e3f826

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dc8e029c2ea1c78e12ad7f58cbc9bb96b3f91ed6d9cc7fd46d9aca35b84a0179

bind-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b66f98df979cc51081259bac708504d86ee3d0e7ce7f93ab7b171bdcaa4bde63

bind-export-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 4a3cd7372e58d5e2958c89feceab1f73506d9b1fe66f89a9a0da862e5a2e7cdf

bind-export-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 64c28ea85b2fe698f24e9b335f3a65e0c7d6fee5320f2d6e4f5cf230d3dcabdd

bind-export-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 03f1c960e31ca07c720e8c5b96e93562f360ac7eef3f816d849a8146f67b0168

bind-export-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 4fac47a7ae939cd1e35d20d1584b996c08fa43c946240233e90186c00e28ad56

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 00106d50dfda71000902b81eb88393a9223a77457808cb53af9d9e7ee12c9529

bind-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 109eff8ca4edb244eaac83f5f554995ea1b6ecc4c0df95625c50648a6d3c025b

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-lite-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 8a69695b0cf8e5990efab30f13a04aa8088edad33d67a9301c0c81e819849ba9

bind-libs-lite-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b1466b05bc97d201f4d6491b5616320e688a05b17515b10f2a1ad134ff635347

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-license-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: cf848d6cdecf3ffa32675a0691f1762de4cf41775e7f30375b3aa9c78b1fd5a1

bind-lite-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: c7c3ef9a76a86ab0176df63216e441a92be2c0e2b69bf325032c4ab1b149d25e

bind-lite-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 682524a5429b9b83e714630425a587b0acd6d2f70be86aeb66daae5575c4ef5a

bind-pkcs11-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b38e6cf0d2517645694c33acb5ac56b38d5036b5d94ddd7e6986223070a29f03

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 65a8e5e5a58c9e2b230775c1ce1bbd16f561b27021097b9eb369e761c3214fac

bind-pkcs11-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 67b13d5b547655150676f842c7d7ed68a69448d7129bd63d9a5d41597a27cd5a

bind-pkcs11-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 0364748c0e37534f3dba7eb8fc86f3ce0408a462da17d45ff7a0f5ede919cd22

bind-pkcs11-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 35978d602ad038475988f4e0cc8c64045801a85c19930ad6a8e72ca88c638afc

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 40a935c22730d9b7ba13ea012718731897f63f5d692455eb71c57e8c1d1a2d65

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-sdb-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 07dac6c55a36f1f34063a1d83501c25dea785619088c2d20caf14339fe5cb88e

bind-sdb-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1773376c19153c8a7cdb0e383b68d15e882521dea2c374a5ca6ec650860072ec

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1fdb1075f51d4a23f94b221dc4170fd7ad48a4de7ce325207faa83ad30d10fcc

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

python3-bind-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: eeb1a07696a38ab4e9d917c455575cdfe1e8ddfdea237776517c8dae7aff3500

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

bind-9.11.26-4.el8_4.2.src.rpm

SHA-256: 91a5ff71daeaf7edcbdc2e277d86b42b0062fe2f07c95d1c7cb3c67116a801b8

x86_64

bind-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 2ca1eae186f6e283910fd1507f3605ee332559ee3ad25ffb0a66da4bb23c3434

bind-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: ebe06675d23353cc2df5abba577328eca12d885c97b899415e64cf99e8e3f826

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dc8e029c2ea1c78e12ad7f58cbc9bb96b3f91ed6d9cc7fd46d9aca35b84a0179

bind-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b66f98df979cc51081259bac708504d86ee3d0e7ce7f93ab7b171bdcaa4bde63

bind-export-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 4a3cd7372e58d5e2958c89feceab1f73506d9b1fe66f89a9a0da862e5a2e7cdf

bind-export-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 64c28ea85b2fe698f24e9b335f3a65e0c7d6fee5320f2d6e4f5cf230d3dcabdd

bind-export-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 03f1c960e31ca07c720e8c5b96e93562f360ac7eef3f816d849a8146f67b0168

bind-export-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 4fac47a7ae939cd1e35d20d1584b996c08fa43c946240233e90186c00e28ad56

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 00106d50dfda71000902b81eb88393a9223a77457808cb53af9d9e7ee12c9529

bind-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 109eff8ca4edb244eaac83f5f554995ea1b6ecc4c0df95625c50648a6d3c025b

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-lite-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 8a69695b0cf8e5990efab30f13a04aa8088edad33d67a9301c0c81e819849ba9

bind-libs-lite-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b1466b05bc97d201f4d6491b5616320e688a05b17515b10f2a1ad134ff635347

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-license-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: cf848d6cdecf3ffa32675a0691f1762de4cf41775e7f30375b3aa9c78b1fd5a1

bind-lite-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: c7c3ef9a76a86ab0176df63216e441a92be2c0e2b69bf325032c4ab1b149d25e

bind-lite-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 682524a5429b9b83e714630425a587b0acd6d2f70be86aeb66daae5575c4ef5a

bind-pkcs11-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b38e6cf0d2517645694c33acb5ac56b38d5036b5d94ddd7e6986223070a29f03

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 65a8e5e5a58c9e2b230775c1ce1bbd16f561b27021097b9eb369e761c3214fac

bind-pkcs11-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 67b13d5b547655150676f842c7d7ed68a69448d7129bd63d9a5d41597a27cd5a

bind-pkcs11-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 0364748c0e37534f3dba7eb8fc86f3ce0408a462da17d45ff7a0f5ede919cd22

bind-pkcs11-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 35978d602ad038475988f4e0cc8c64045801a85c19930ad6a8e72ca88c638afc

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 40a935c22730d9b7ba13ea012718731897f63f5d692455eb71c57e8c1d1a2d65

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-sdb-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 07dac6c55a36f1f34063a1d83501c25dea785619088c2d20caf14339fe5cb88e

bind-sdb-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1773376c19153c8a7cdb0e383b68d15e882521dea2c374a5ca6ec650860072ec

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1fdb1075f51d4a23f94b221dc4170fd7ad48a4de7ce325207faa83ad30d10fcc

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

python3-bind-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: eeb1a07696a38ab4e9d917c455575cdfe1e8ddfdea237776517c8dae7aff3500

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

bind-9.11.26-4.el8_4.2.src.rpm

SHA-256: 91a5ff71daeaf7edcbdc2e277d86b42b0062fe2f07c95d1c7cb3c67116a801b8

ppc64le

bind-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 44fc039fb5e9405273a3367a5ad11e68aad099b71633d3427d2eb9bda1b313d3

bind-chroot-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: f3a844b3c1efbca88cc2be175604bd3802602c4f5b2d9509d0729022ef38e2fb

bind-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 2702af1fa73292e673c304b30efdaac621763421148646b750182de3c489d5f5

bind-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 2702af1fa73292e673c304b30efdaac621763421148646b750182de3c489d5f5

bind-debugsource-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: c3cc72df410ed7d51fc7204797d321d0e463d8986c9bac9f62344332ddde9897

bind-debugsource-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: c3cc72df410ed7d51fc7204797d321d0e463d8986c9bac9f62344332ddde9897

bind-devel-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 310724f5b4a1a834dcb03a0d1344e3425a4c8291c76bd970720c0ec2365eb4af

bind-export-devel-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 3641e2ce1425c17f6fe7a7c1f5fb10538c4381a3b76508aa003988143156e383

bind-export-libs-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 3d177e3f6784d877e347f3a2e4cedeb8d5f2ce441b22daefa12c4599b8959f63

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 8f2513829e01e1220000cfedac748e478ba7c699bb6c0d0e2b40bb50d9aa9995

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 8f2513829e01e1220000cfedac748e478ba7c699bb6c0d0e2b40bb50d9aa9995

bind-libs-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 11d0fcaae29dfbdbf35c254f8b03f40f21f68099dc73a22a8887ed988392391f

bind-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 039fe86faf5a52c34c7a4bce94d3dd88a7cc55aac75eba861d24c1ccd94241ed

bind-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 039fe86faf5a52c34c7a4bce94d3dd88a7cc55aac75eba861d24c1ccd94241ed

bind-libs-lite-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 1bd08d31cb5c5339bb2c5ab6e04932d6ba4962f8c028f2a92d7295355b05621d

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 661d171e87e0399a45e96e68b39c330c1e4d2dcb6cbd5bed63218b846ec97cd4

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 661d171e87e0399a45e96e68b39c330c1e4d2dcb6cbd5bed63218b846ec97cd4

bind-license-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: cf848d6cdecf3ffa32675a0691f1762de4cf41775e7f30375b3aa9c78b1fd5a1

bind-lite-devel-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 0a3f5b83c6863848f93eec7888acc5d9e562f41e159d14d2ba02c061247e5c9c

bind-pkcs11-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 84ff481407093b31ce080a2066313973e72e481f5adfaa72ceb85f1b73ac8a1a

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 4e5c33c5552116909f0cc76c1d0579fe640b426b1737b98db9ef0bf90623c21e

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 4e5c33c5552116909f0cc76c1d0579fe640b426b1737b98db9ef0bf90623c21e

bind-pkcs11-devel-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 557a4d64e2cc7dd41565060e84e4f5f49860b9fc63790c1d0f44c82b2b372c84

bind-pkcs11-libs-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 2b4bb869293750a9ece5db931f8922d217dcd6f41b6618aecfbb1a1c283901a4

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 0e4df3b94f0752b7f44ca60680c4ba6385c31a2ca584b4f9b29ea9d0ce25ac7d

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 0e4df3b94f0752b7f44ca60680c4ba6385c31a2ca584b4f9b29ea9d0ce25ac7d

bind-pkcs11-utils-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: f639adc5e7041554889f9e3de8b0f2a0ce61bf2b1ead39b320a8085bf8f98449

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 50ef98c8ac1035975fb0f1ff34a903351075db37266581f65a5f5849b3b64b11

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 50ef98c8ac1035975fb0f1ff34a903351075db37266581f65a5f5849b3b64b11

bind-sdb-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 5ba48858d013ff688fed8bfa46ef8173d65dd089d49069e24e92022695766b6b

bind-sdb-chroot-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 9181e7e2cf381857e8a7499f43b59ee8f16c8e4f4b21e4e204fdb9b410c1d233

bind-sdb-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 99ec18e6518651f0fb6830efde4bdcdc531ee63b0d3e24410dad2cf05cf485ca

bind-sdb-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 99ec18e6518651f0fb6830efde4bdcdc531ee63b0d3e24410dad2cf05cf485ca

bind-utils-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 80631d62bf041311a172e3cd5db6ae4e65da669423223932e2fd35bdb534f973

bind-utils-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 98e4d7c4a42edbd89af444338e9061e6fb569c6f5283240b1f713ea6ad6c1415

bind-utils-debuginfo-9.11.26-4.el8_4.2.ppc64le.rpm

SHA-256: 98e4d7c4a42edbd89af444338e9061e6fb569c6f5283240b1f713ea6ad6c1415

python3-bind-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: eeb1a07696a38ab4e9d917c455575cdfe1e8ddfdea237776517c8dae7aff3500

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

bind-9.11.26-4.el8_4.2.src.rpm

SHA-256: 91a5ff71daeaf7edcbdc2e277d86b42b0062fe2f07c95d1c7cb3c67116a801b8

x86_64

bind-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 2ca1eae186f6e283910fd1507f3605ee332559ee3ad25ffb0a66da4bb23c3434

bind-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: ebe06675d23353cc2df5abba577328eca12d885c97b899415e64cf99e8e3f826

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 5b0f67604a4ca4713a4ce993ed49096403a82cc068ba09593ab8262992964df6

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 5f3182389513f9151e928b1b1bae535166d14872591194e121fe070af697f675

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.i686.rpm

SHA-256: ad629f5b9d4c0bbbfa7e9dbc87d5efe32ede6c8e25919ad3bf7869e01a5c2c41

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-debugsource-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: f569417d8b31be90cfe1dc03d1423eba58bfab686d08dd8a8013ef1374a4e6e7

bind-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dc8e029c2ea1c78e12ad7f58cbc9bb96b3f91ed6d9cc7fd46d9aca35b84a0179

bind-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b66f98df979cc51081259bac708504d86ee3d0e7ce7f93ab7b171bdcaa4bde63

bind-export-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 4a3cd7372e58d5e2958c89feceab1f73506d9b1fe66f89a9a0da862e5a2e7cdf

bind-export-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 64c28ea85b2fe698f24e9b335f3a65e0c7d6fee5320f2d6e4f5cf230d3dcabdd

bind-export-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 03f1c960e31ca07c720e8c5b96e93562f360ac7eef3f816d849a8146f67b0168

bind-export-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 4fac47a7ae939cd1e35d20d1584b996c08fa43c946240233e90186c00e28ad56

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 01c47e4933dc05deac1efab57362aa0a4b7065ef3ed02ffff204d9358eb59129

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-export-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 88e24a13a24bbedc9f372bc17b678f2831c680c2666cd826583fedc09b23edd5

bind-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 00106d50dfda71000902b81eb88393a9223a77457808cb53af9d9e7ee12c9529

bind-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 109eff8ca4edb244eaac83f5f554995ea1b6ecc4c0df95625c50648a6d3c025b

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: dde43b4f70c46d1f3898aba42cacfd26d0e8d09aaa11a05a4fba2baa188731cc

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 58a5ac659829c8d46525241eb1b8ee2a6fb8e439bfc8a23492046273d3700a95

bind-libs-lite-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 8a69695b0cf8e5990efab30f13a04aa8088edad33d67a9301c0c81e819849ba9

bind-libs-lite-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b1466b05bc97d201f4d6491b5616320e688a05b17515b10f2a1ad134ff635347

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 3d373fbc0d2a9923bb711425856d1c8dcbfb5bcd635c891788d80d2c8e63e400

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-libs-lite-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: c79e8b1105df4f11168ff0f604ebee398634d420d06c8c7b421324c0fddf5399

bind-license-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: cf848d6cdecf3ffa32675a0691f1762de4cf41775e7f30375b3aa9c78b1fd5a1

bind-lite-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: c7c3ef9a76a86ab0176df63216e441a92be2c0e2b69bf325032c4ab1b149d25e

bind-lite-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 682524a5429b9b83e714630425a587b0acd6d2f70be86aeb66daae5575c4ef5a

bind-pkcs11-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b38e6cf0d2517645694c33acb5ac56b38d5036b5d94ddd7e6986223070a29f03

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 76dfb9c31b763fa28b156480b083882fd4e205f94f7baa7f5b39ea1167a3fccb

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: d56375e54860994b146073a69dcf3d1e78bf3b74883bc2f52164888898309f2d

bind-pkcs11-devel-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 65a8e5e5a58c9e2b230775c1ce1bbd16f561b27021097b9eb369e761c3214fac

bind-pkcs11-devel-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 67b13d5b547655150676f842c7d7ed68a69448d7129bd63d9a5d41597a27cd5a

bind-pkcs11-libs-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 0364748c0e37534f3dba7eb8fc86f3ce0408a462da17d45ff7a0f5ede919cd22

bind-pkcs11-libs-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 35978d602ad038475988f4e0cc8c64045801a85c19930ad6a8e72ca88c638afc

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b920ad2f84c131eef8910450117243ec37c0809f62ed8d3bb4d426990f380225

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-libs-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: b84547259b7816314f32cf7693e3c8c9d4307f331dd3d171f7bf03e389218a72

bind-pkcs11-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 40a935c22730d9b7ba13ea012718731897f63f5d692455eb71c57e8c1d1a2d65

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: b2d331945ef29a8bfb4f8dc8e24b693dde2f345d3722a6fcfa6ef0d89f20d23e

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-pkcs11-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 0e8c492295dbfc5a1d74ce78b6c89498bda958219d0a01586b2357de7d7670c0

bind-sdb-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 07dac6c55a36f1f34063a1d83501c25dea785619088c2d20caf14339fe5cb88e

bind-sdb-chroot-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1773376c19153c8a7cdb0e383b68d15e882521dea2c374a5ca6ec650860072ec

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: 84fb7c9135fc4154946bfcdc7c87b0c7b5ed5ffd7e0d3a10642cffe63f8f7439

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-sdb-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 45c0e457a233149e37c59295c933068f05779a98b50359eb2eb7121d5f08e203

bind-utils-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 1fdb1075f51d4a23f94b221dc4170fd7ad48a4de7ce325207faa83ad30d10fcc

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.i686.rpm

SHA-256: d88a63bf0a8bb5f06528719afb6520a5be901141ea2fff3152570bf04f3b8d0b

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

bind-utils-debuginfo-9.11.26-4.el8_4.2.x86_64.rpm

SHA-256: 3d4fee3ba7e90d241010c2bc8e12b69c139e7ce21a356092297278b3646491ea

python3-bind-9.11.26-4.el8_4.2.noarch.rpm

SHA-256: eeb1a07696a38ab4e9d917c455575cdfe1e8ddfdea237776517c8dae7aff3500

Related news

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server

Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes - CVE-2022-25647 (CVSS score: 7.5) - A deserialization

Red Hat Security Advisory 2023-5029-01

Red Hat Security Advisory 2023-5029-01 - An update is now available for Red Hat OpenShift GitOps 1.9. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4972-01

Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-4893-01

Red Hat Security Advisory 2023-4893-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

Red Hat Security Advisory 2023-4624-01

Red Hat Security Advisory 2023-4624-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a memory leak vulnerability.

RHSA-2023:4624: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.6 security update

Red Hat OpenShift Service Mesh 2.3.6 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35941: A flaw was found in Envoy, where a malicious client can construct credentials with permanent validity in a specific scenario. This issue is caused by some rare scenarios, such as the combination of host and expiration time, in which the HMAC payload can always be valid in the OAuth2 filter's HMAC check. * CVE-2023-35942: A flaw was found in Envoy, where gRPC access lo...

RHSA-2023:4625: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.2 security update

Red Hat OpenShift Service Mesh 2.4.2 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35941: A flaw was found in Envoy, where a malicious client can construct credentials with permanent validity in a specific scenario. This issue is caused by some rare scenarios, such as the combination of host and expiration time, in which the HMAC payload can always be valid in the OAuth2 filter's HMAC check. * CVE-2023-35943: A flaw was found in Envoy. Suppose an origin he...

Red Hat Security Advisory 2023-4310-01

Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4225: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Red Hat Security Advisory 2023-4152-01

Red Hat Security Advisory 2023-4152-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

Red Hat Security Advisory 2023-4153-01

Red Hat Security Advisory 2023-4153-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

RHSA-2023:4005: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.

Debian Security Advisory 5439-1

Debian Linux Security Advisory 5439-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.

Ubuntu Security Notice USN-6183-1

Ubuntu Security Notice 6183-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled the cache size limit. A remote attacker could possibly use this issue to consume memory, leading to a denial of service. It was discovered that Bind incorrectly handled the recursive-clients quota. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.

CVE-2023-2828: CVE-2023-2828

Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9...