Headline
RHSA-2023:4153: Red Hat Security Advisory: bind security update
An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Synopsis
Important: bind security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
- bind: named’s configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted automatically.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2216227 - CVE-2023-2828 bind: named’s configured cache size limit can be significantly exceeded
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
bind-9.11.13-6.el8_2.5.src.rpm
SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a
x86_64
bind-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937
bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5
bind-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a
bind-export-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1
bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74
bind-export-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572
bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b
bind-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633
bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-license-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4
bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1
bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270
bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd
bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91
bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543
bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971
bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
python3-bind-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
bind-9.11.13-6.el8_2.5.src.rpm
SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a
x86_64
bind-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937
bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5
bind-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a
bind-export-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1
bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74
bind-export-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572
bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b
bind-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633
bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-license-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4
bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1
bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270
bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd
bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91
bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543
bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971
bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
python3-bind-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
bind-9.11.13-6.el8_2.5.src.rpm
SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a
ppc64le
bind-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 8c228d0a0d345d7a72d9bfc433492d8b1b18ae5e005c53cca5c7d6ef5172c05a
bind-chroot-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 0c6e314242e07dc48f31cc320194c310603566127ba1ffb1bf903163aab83f45
bind-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 932e72dc7b611890e43f15d621ea5bf75a79f4ea3c546b952777041cf091253a
bind-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 932e72dc7b611890e43f15d621ea5bf75a79f4ea3c546b952777041cf091253a
bind-debugsource-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 1d8f669225e5f180450c3e58fb398536384126910649ecaef6a70e9489056786
bind-debugsource-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 1d8f669225e5f180450c3e58fb398536384126910649ecaef6a70e9489056786
bind-devel-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 09b412981dc7f1f90cffb525704333f7de1254eb854692ed7987fb7502266b8e
bind-export-devel-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 4bb65788f0edec81794af91bb7ed1ce9646d22541901f797cae3caa1f0d09b49
bind-export-libs-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 53b9e19642eded718fa7b7019ffa6e08a5ecee6f7136b411467bfde4075174e8
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 773ec301b5ed84be555d5008f7b0a38575c420afcbc2975041f2fa6257edb4e9
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 773ec301b5ed84be555d5008f7b0a38575c420afcbc2975041f2fa6257edb4e9
bind-libs-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: e93fb33caddd1843e330da542162f9355d7fa4f045781bea97d542606a9d2ad9
bind-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: c966767acb3ec77e459bd22c67319d43aa361bf568c231f35b828fb6c154fad3
bind-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: c966767acb3ec77e459bd22c67319d43aa361bf568c231f35b828fb6c154fad3
bind-libs-lite-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: a5fb27f17789e7c1cadaa62c56986bf5535e6fa6b454d0fbf5ed677884328a65
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 1becd87c431a49ff59eecb71019779d41c43ddb211e4f72838a82274acf7ca87
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 1becd87c431a49ff59eecb71019779d41c43ddb211e4f72838a82274acf7ca87
bind-license-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4
bind-lite-devel-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 7ab44fd77d9c4d81697d3df5ce0d4fd4e8e45fa6f196d0be68330dfdd2970337
bind-pkcs11-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: c9bee954a6b365da9723bcca4f2f5fa82345a9285459f0a2dfdefb4171e291e1
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: dd90bb766f5436c394ee547bddd38df817ebe05a5766a4b466fc757ad79d0483
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: dd90bb766f5436c394ee547bddd38df817ebe05a5766a4b466fc757ad79d0483
bind-pkcs11-devel-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 3551592ea432d7b2c04c710396588499473dde66daab3db4021bb117d25658aa
bind-pkcs11-libs-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 182c39f41a5e9ec2ff560eb59351c0ae5801452ecd02d4297b915b7e7f01e49d
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 214cda50eee5a57e4dafad63f3bd35a114d082a74e153f066ad2847b03d90dc2
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 214cda50eee5a57e4dafad63f3bd35a114d082a74e153f066ad2847b03d90dc2
bind-pkcs11-utils-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: f3abbf9608043166d8a93cbbc6513a19f188684522a8bd1c03448ab7e511eec3
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: eaa3d2ea80f1c44e9d92184af1d1322b116110ce3cdad3ce706ab5b6df7dabac
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: eaa3d2ea80f1c44e9d92184af1d1322b116110ce3cdad3ce706ab5b6df7dabac
bind-sdb-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 00b4f34daed5843eb0ea4fc873058ef235683fb12870f834b4a1c57eff32a09b
bind-sdb-chroot-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 37830808a704d5d63a236a94f82a62405d308d77ad33ca5a2e9cbdc218d7f219
bind-sdb-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 531987f1a711ca3bee72aa9236f29b1ac8e4fb8e53843e471580834ac6206db1
bind-sdb-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: 531987f1a711ca3bee72aa9236f29b1ac8e4fb8e53843e471580834ac6206db1
bind-utils-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: c5fdff2e145de325b326a952bbee8db25421efbf5c28195262197cdcc38b976f
bind-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: f0b9d6b9df36b5951bacb2f2e1c8fcdd1144bd3ad2d949ce5972de05f863b4b6
bind-utils-debuginfo-9.11.13-6.el8_2.5.ppc64le.rpm
SHA-256: f0b9d6b9df36b5951bacb2f2e1c8fcdd1144bd3ad2d949ce5972de05f863b4b6
python3-bind-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
bind-9.11.13-6.el8_2.5.src.rpm
SHA-256: cf4aefc8c2231f6212a08a706b75cdea33970c8d997b9d5cbdd55b980bb3850a
x86_64
bind-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 320fb405920319d12adc4c8938e6987e2c731e41d410b5fc07364862ab503937
bind-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6e87bf725d80ca942a0f1afd79a549ac8003019082ce6d25d5b7aa8d79a40cfc
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7173a18ae05a5d1a80dee3efe77727840c3e28bd9a09358786f79d0d9c4fccae
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: cb25b31ace46b3f8f19584f859e29671b957091381430426219a71c6e264c0bf
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 80bfad7f82d4adab00e063e2bc68722a81242d36e88d0a138196bd4379402358
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-debugsource-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 772023576fbec7315a9787c3cfedda2829b8a1899787d87305d9d618e3bff030
bind-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: aba0e9ff6ce68c75382832b85f80fbdb521ac5da9c0cf6cea46ab466d7854fa5
bind-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 0f1682b6d9612a40535e7369802d4681689091ba1f66a5273a87c49eabfeff8a
bind-export-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 7fd73e2538f6f1d7e61d2b4ad869f949dc3ed2585971911ab2c68900c22fa9d1
bind-export-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b05759a5d7eccc3b682ebe36200efdc9d297b1ca99f17ddc18f357c1e317ff74
bind-export-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 73ec984eff9fd561580958dcef28febbb9574b54094ff60ea8b73a9b4daa5572
bind-export-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 496776217bb1f35baab00e5410b45ce1f44566e584b06f8e2def6632add0c719
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 988deb14b99157b34a2541e4f98f0fb518bfb96e377fe4d2ad02127b85cf10a6
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-export-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: ec5ab7d516f79225b8e6a866bbb173f5475f19f1c9de021af53e4a0a0272e817
bind-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 01c1adfb9acd0782dc65badc9cee3c67c99eab6b07805811b0fb6ab0e18af29b
bind-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 189a9de745222cb768dd45cedf90d101d38a6f104d2f22de31005291a13b5180
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d476a76130a9b0e94c12df39058f3e15b3ddfb9a7def088589c855497bce64bc
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6ddd18f34bd4c27dcb96d7f67f8f4fe6fe24342b41edc53b521ef250503ee67d
bind-libs-lite-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 4b5d01e2d7b117e427ded0924aac852d5dc47e80a377822c423de7ac8017f633
bind-libs-lite-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5298bb3ef88202b865cb83a45ffabe961d0470d139cde8125232f658abad5551
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 49cb382c34d7bcadb222209a050f9621f7cdb36094f1086cbc222f08afba7a8a
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-libs-lite-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: c5cc0a19d3b8a0bc9b045b8c5e6eeeb8b3940ecf296eb8b21c536791a0a1c519
bind-license-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 42952f7a046f01addd41485ca8dacc4a9bf2e3b92df9fb5fdae83258be1b3da4
bind-lite-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 10e8ac0a0ca4807cfd50b5f733c23ff21e308233d0be2b89e302225c12acb4a1
bind-lite-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8b1a236b0d6d12ab1d089b783f85f0ff1d49268c9d7549ecc7d4c7a86fd9c270
bind-pkcs11-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: b422d2610f2f933113d86ba274441ad7ca8a5af7cb240ccd62cdde7b83850571
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 3d11a00eaec4499e9a83a185d4f3938728b5c0afe97a3301edad58ccdb2c0f92
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f513b583bea03818edfa7ccbd4bf856201bc6bd8baf1f8a7a4305fb7f2acad90
bind-pkcs11-devel-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 5217237533d7f6217f51ffea12a4925537bb52455005294a27af372b2e425ffd
bind-pkcs11-devel-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 1d3ef247a0de69fce28c5b50656f553b2a9f1d0edd89f66ef65f5c6b4c4e4f91
bind-pkcs11-libs-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 12a2f942e18e4601b6ffcd64a16378bcc92a59d5729270afb0a36a7c7964d543
bind-pkcs11-libs-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6766511adc3f56e3ec4e701688668af5e976ab67c8fe184ac39b484230c474de
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 81e59244398b088f402fa9fbc6da3f706c755161138376411feb547a0166f2a4
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-libs-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 8f005aba592e278278240309e17ea9392d8487621c5c9a4d03859e5c196ce98f
bind-pkcs11-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 5b3888dba555e526554a3424dd37eab2f5fbd0475e544f810702a476b95ed01e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: d5da7686f4122ae6ce9ee343f9f186014c96dd492e3b9a41bb9f470144821086
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-pkcs11-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: dbf9a898e850a28bc2afeeb07c10c504968a1cd5431bc37fe87ea000bc78211e
bind-sdb-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 6005018f4d2a3fa2512f0a77567e6c71e8ed451ba8ac7b25a386df2b9e7e2971
bind-sdb-chroot-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 3e9a165cdb9bcade7adedab068613a195e82a23bd03e1ac55fdbf4f229786517
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 0cc6eb8caced1bd4ab75629f18a0a375e16ef5aeae55a4f357b540b78f728320
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-sdb-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 962357120bd72fc07822b4f2a2cfdb982307f79afc60fb8c6fbb59b142564bce
bind-utils-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: f9538c35446d56b20d1e72c38e6afb9c49ecb6450db974e7925662b048f1740e
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.i686.rpm
SHA-256: 095a7399b24e38ec1589c789df623a120560cbe4f82bb9d49b685695fea3d540
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
bind-utils-debuginfo-9.11.13-6.el8_2.5.x86_64.rpm
SHA-256: 03e7d68c15f7d999057edb6f860789a4890dc75443c441146a7c95dbdfaac91c
python3-bind-9.11.13-6.el8_2.5.noarch.rpm
SHA-256: 69152fd3f8317c96eb47247b2e44e8fbb891db4ed5ea445e61da3e1022e3a188
Related news
Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes - CVE-2022-25647 (CVSS score: 7.5) - A deserialization
Red Hat Security Advisory 2023-5029-01 - An update is now available for Red Hat OpenShift GitOps 1.9. Issues addressed include a denial of service vulnerability.
Multicluster Engine for Kubernetes 2.1.8 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37466: A flaw was found in the vm2 Promise handler sanitization, which allows attackers to esc...
Infoblox NIOS through 8.5.1 has a faulty component that accepts malicious input without sanitization, resulting in shell access.
Multicluster Engine for Kubernetes 2.2.7 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. * CVE-2023-37903: A flaw was found in the vm2 custom inspect function, which allows attackers to escape t...
Red Hat Security Advisory 2023-4625-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Red Hat OpenShift Service Mesh 2.4.2 Containers Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-35941: A flaw was found in Envoy, where a malicious client can construct credentials with permanent validity in a specific scenario. This issue is caused by some rare scenarios, such as the combination of host and expiration time, in which the HMAC payload can always be valid in the OAuth2 filter's HMAC check. * CVE-2023-35943: A flaw was found in Envoy. Suppose an origin he...
Red Hat Security Advisory 2023-4310-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.46. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat OpenShift Container Platform release 4.11.46 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows a...
Red Hat Security Advisory 2023-4332-01 - An update for bind is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important.
Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.
Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.
Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
Red Hat Security Advisory 2023-4154-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
Red Hat Security Advisory 2023-4152-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
Red Hat Security Advisory 2023-4100-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
An update for bind is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Red Hat Security Advisory 2023-4037-01 - An update for bind9.16 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
An update for bind9.16 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Red Hat Security Advisory 2023-4005-02 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.
An update for bind is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-2828: A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly.
Debian Linux Security Advisory 5439-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel
Ubuntu Security Notice 6183-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled the cache size limit. A remote attacker could possibly use this issue to consume memory, leading to a denial of service. It was discovered that Bind incorrectly handled the recursive-clients quota. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04.
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9...