Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:4153: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Red Hat Security Data
#vulnerability#linux#red_hat#sap

Synopsis

Important: bind security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • bind: named’s configured cache size limit can be significantly exceeded (CVE-2023-2828)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, the BIND daemon (named) will be restarted automatically.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64

Fixes

  • BZ - 2216227 - CVE-2023-2828 bind: named’s configured cache size limit can be significantly exceeded

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

bind-9.11.13-6.el8_2.5.src.rpm

SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a

x86_64

bind-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937

bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5

bind-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a

bind-export-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1

bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74

bind-export-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572

bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b

bind-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633

bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-license-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4

bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1

bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270

bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd

bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91

bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543

bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971

bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

python3-bind-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

bind-9.11.13-6.el8_2.5.src.rpm

SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a

x86_64

bind-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937

bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5

bind-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a

bind-export-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1

bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74

bind-export-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572

bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b

bind-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633

bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-license-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4

bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1

bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270

bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd

bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91

bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543

bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971

bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

python3-bind-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

bind-9.11.13-6.el8_2.5.src.rpm

SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a

ppc64le

bind-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 8c228d0a0d345d7a72d9bfc433492d8b1b18ae5e005c53cca5c7d6ef5172c05a

bind-chroot-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 0c6e314242e07dc48f31cc320194c310603566127ba1ffb1bf903163aab83f45

bind-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 932e72dc7b611890e43f15d621ea5bf75a79f4ea3c546b952777041cf091253a

bind-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 932e72dc7b611890e43f15d621ea5bf75a79f4ea3c546b952777041cf091253a

bind-debugsource-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 1d8f669225e5f180450c3e58fb398536384126910649ecaef6a70e9489056786

bind-debugsource-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 1d8f669225e5f180450c3e58fb398536384126910649ecaef6a70e9489056786

bind-devel-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 09b412981dc7f1f90cffb525704333f7de1254eb854692ed7987fb7502266b8e

bind-export-devel-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 4bb65788f0edec81794af91bb7ed1ce9646d22541901f797cae3caa1f0d09b49

bind-export-libs-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 53b9e19642eded718fa7b7019ffa6e08a5ecee6f7136b411467bfde4075174e8

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 773ec301b5ed84be555d5008f7b0a38575c420afcbc2975041f2fa6257edb4e9

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 773ec301b5ed84be555d5008f7b0a38575c420afcbc2975041f2fa6257edb4e9

bind-libs-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: e93fb33caddd1843e330da542162f9355d7fa4f045781bea97d542606a9d2ad9

bind-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: c966767acb3ec77e459bd22c67319d43aa361bf568c231f35b828fb6c154fad3

bind-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: c966767acb3ec77e459bd22c67319d43aa361bf568c231f35b828fb6c154fad3

bind-libs-lite-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: a5fb27f17789e7c1cadaa62c56986bf5535e6fa6b454d0fbf5ed677884328a65

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 1becd87c431a49ff59eecb71019779d41c43ddb211e4f72838a82274acf7ca87

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 1becd87c431a49ff59eecb71019779d41c43ddb211e4f72838a82274acf7ca87

bind-license-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4

bind-lite-devel-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 7ab44fd77d9c4d81697d3df5ce0d4fd4e8e45fa6f196d0be68330dfdd2970337

bind-pkcs11-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: c9bee954a6b365da9723bcca4f2f5fa82345a9285459f0a2dfdefb4171e291e1

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: dd90bb766f5436c394ee547bddd38df817ebe05a5766a4b466fc757ad79d0483

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: dd90bb766f5436c394ee547bddd38df817ebe05a5766a4b466fc757ad79d0483

bind-pkcs11-devel-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 3551592ea432d7b2c04c710396588499473dde66daab3db4021bb117d25658aa

bind-pkcs11-libs-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 182c39f41a5e9ec2ff560eb59351c0ae5801452ecd02d4297b915b7e7f01e49d

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 214cda50eee5a57e4dafad63f3bd35a114d082a74e153f066ad2847b03d90dc2

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 214cda50eee5a57e4dafad63f3bd35a114d082a74e153f066ad2847b03d90dc2

bind-pkcs11-utils-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: f3abbf9608043166d8a93cbbc6513a19f188684522a8bd1c03448ab7e511eec3

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: eaa3d2ea80f1c44e9d92184af1d1322b116110ce3cdad3ce706ab5b6df7dabac

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: eaa3d2ea80f1c44e9d92184af1d1322b116110ce3cdad3ce706ab5b6df7dabac

bind-sdb-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 00b4f34daed5843eb0ea4fc873058ef235683fb12870f834b4a1c57eff32a09b

bind-sdb-chroot-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 37830808a704d5d63a236a94f82a62405d308d77ad33ca5a2e9cbdc218d7f219

bind-sdb-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 531987f1a711ca3bee72aa9236f29b1ac8e4fb8e53843e471580834ac6206db1

bind-sdb-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: 531987f1a711ca3bee72aa9236f29b1ac8e4fb8e53843e471580834ac6206db1

bind-utils-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: c5fdff2e145de325b326a952bbee8db25421efbf5c28195262197cdcc38b976f

bind-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: f0b9d6b9df36b5951bacb2f2e1c8fcdd1144bd3ad2d949ce5972de05f863b4b6

bind-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm

SHA-256: f0b9d6b9df36b5951bacb2f2e1c8fcdd1144bd3ad2d949ce5972de05f863b4b6

python3-bind-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

bind-9.11.13-6.el8_2.5.src.rpm

SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a

x86_64

bind-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937

bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030

bind-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5

bind-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a

bind-export-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1

bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74

bind-export-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572

bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817

bind-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b

bind-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d

bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633

bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519

bind-license-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4

bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1

bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270

bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90

bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd

bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91

bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543

bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f

bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e

bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971

bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce

bind-utils-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm

SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm

SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c

python3-bind-9.11.13-6.el8_2.5.noarch.rpm

SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188

Related news

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server

Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes - CVE-2022-25647 (CVSS score: 7.5) - A deserialization

Red Hat Security Advisory 2023-5029-01

Red Hat Security Advisory 2023-5029-01 - An update is now available for Red Hat OpenShift GitOps 1.9. Issues addressed include a denial of service vulnerability.

RHSA-2023:4972: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.8 security updates and bug fixes

Multicluster Engine for Kubernetes 2.1.8 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...

CVE-2023-37249: NIOS is vulnerable to CVE-2023-37249

Infoblox NIOS through 8.5.1 has a faulty component that accepts malicious input without sanitization, resulting in shell access.

RHSA-2023:4650: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.7 security updates and bug fixes

Multicluster Engine for Kubernetes 2.2.7 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37903: A flaw was found in the vm2 custom inspect function, which allows attackers to escape t...

Red Hat Security Advisory 2023-4625-01

Red Hat Security Advisory 2023-4625-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.

RHSA-2023:4625: Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.2 security update

Red Hat OpenShift Service Mesh 2.4.2 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35941: A flaw was found in Envoy, where a malicious client can construct credentials with permanent validity in a specific scenario. This issue is caused by some rare scenarios, such as the combination of host and expiration time, in which the HMAC payload can always be valid in the OAuth2 filter's HMAC check. * CVE-2023-35943: A flaw was found in Envoy. Suppose an origin he...

Red Hat Security Advisory 2023-4310-01

Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2023:4310: Red Hat Security Advisory: OpenShift Container Platform 4.11.46 security update

Red Hat OpenShift Container Platform release 4.11.46 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows a...

Red Hat Security Advisory 2023-4332-01

Red Hat Security Advisory 2023-4332-01 - An update for bind is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important.

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

Red Hat Security Advisory 2023-4154-01

Red Hat Security Advisory 2023-4154-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

Red Hat Security Advisory 2023-4152-01

Red Hat Security Advisory 2023-4152-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

Red Hat Security Advisory 2023-4100-01

Red Hat Security Advisory 2023-4100-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

RHSA-2023:4152: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.

RHSA-2023:4154: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.

Red Hat Security Advisory 2023-4037-01

Red Hat Security Advisory 2023-4037-01 - An update for bind9.16 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

RHSA-2023:4037: Red Hat Security Advisory: bind9.16 security update

An update for bind9.16 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.

Red Hat Security Advisory 2023-4005-02

Red Hat Security Advisory 2023-4005-02 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

RHSA-2023:4005: Red Hat Security Advisory: bind security update

An update for bind is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.

Debian Security Advisory 5439-1

Debian Linux Security Advisory 5439-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.

U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel

Ubuntu Security Notice USN-6183-1

Ubuntu Security Notice 6183-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled the cache size limit. A remote attacker could possibly use this issue to consume memory, leading to a denial of service. It was discovered that Bind incorrectly handled the recursive-clients quota. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.

CVE-2023-2828: CVE-2023-2828

Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9...