- Issued:
- 2010-01-20
- Updated:
- 2010-01-20
RHSA-2010:0062 - Security Advisory
Synopsis
Moderate: bind security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated bind packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Description
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was
running as a DNSSEC-validating resolver, it could incorrectly cache
NXDOMAIN responses, as if they were valid, for records proven by NSEC or
NSEC3 to exist. A remote attacker could use this flaw to cause a BIND
server to return the bogus, cached NXDOMAIN responses for valid records and
prevent users from retrieving those records (denial of service).
(CVE-2010-0097)
The original fix for CVE-2009-4022 was found to be incomplete. BIND was
incorrectly caching certain responses without performing proper DNSSEC
validation. CNAME and DNAME records could be cached, without proper DNSSEC
validation, when received from processing recursive client queries that
requested DNSSEC records but indicated that checking should be disabled. A
remote attacker could use this flaw to bypass the DNSSEC validation check
and perform a cache poisoning attack if the target BIND server was
receiving such client queries. (CVE-2010-0290)
All BIND users are advised to upgrade to these updated packages, which
contain a backported patch to resolve these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 554851 - CVE-2010-0097 BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses
- BZ - 557121 - CVE-2010-0290 BIND upstream fix for CVE-2009-4022 is incomplete
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
x86_64 | |
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2 |
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87 |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741 |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1 |
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd |
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05 |
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd |
ia64 | |
bind-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: e0b39debee1c9be5f9417e94572c984e237740899db6594e88e5223489083285 |
bind-chroot-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: 7246a4a51f525ff3e0fd099e9b0a01bda5ff520e9ca2d44bcf16a3796974dfef |
bind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: 9e8d4fa6ff083f32bd2963844c3ba9edf2b93d74c842e9b42293912e977e7aec |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: 43d6625b0dace9666e0ecbddce1fbbbff6d59607a4094b92e384e28239e24b2a |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-libs-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: 10cd33f545fca8b1829ff15f4f23d280953c55e38474199836976e5c4f19bb12 |
bind-sdb-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: aa062addc0af3b16c5b08b3c7411b83c6e738cf16f2691a9ec738c65b90d9bcf |
bind-utils-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: 5494ac9cea6d88eaec64dd4d2480b89c92d515846cd7902db202ef8134afeeec |
caching-nameserver-9.3.6-4.P1.el5_4.2.ia64.rpm | SHA-256: fd3b7542b69f38b865759192d08513c51370b837ea8a515617aabd45dfd5eecd |
i386 | |
bind-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c |
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b |
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f |
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
x86_64 | |
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2 |
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87 |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741 |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1 |
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd |
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05 |
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd |
i386 | |
bind-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c |
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b |
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f |
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
x86_64 | |
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2 |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1 |
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd |
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05 |
i386 | |
bind-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b |
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
s390x | |
bind-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 4a9dac72a3fb6aa048f7c9c57ec064a62a7096c897da8f6895de51990f6b7ba6 |
bind-chroot-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 9c586ed7adf595dad74924f3fb6d4e3883feab07c29a993da0c89ef30814d1e5 |
bind-devel-9.3.6-4.P1.el5_4.2.s390.rpm | SHA-256: 2c704f5d3f7335d35bfd12afdaac5012398b335869cfe570ba7838a7182640dd |
bind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 92dbc15ac3e709f30f6c9d9847e00aa6fd064c465deab0f40d7e7da25179bf47 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390.rpm | SHA-256: c3c80ba18c8b9f24d2aefd3d604118dc11ff7ad727d3ef9d50f29f8b64853196 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: f6af5cf46f6c18f57ec0e02edc1dd6c5ed8a1b04511272de10b13d48fdaefdac |
bind-libs-9.3.6-4.P1.el5_4.2.s390.rpm | SHA-256: 183b690bf64f34ca3e13dcc89057240b29c065236d5824b4d610b0520a542b9d |
bind-libs-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 68d8c83e30fab1df998318ab522cb5e31e2db4a994823debac8252fa3dda5561 |
bind-sdb-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 306ccb8599645af4d67bf0dc003f4b5993a86ce2aa41d2c4550506c7502950bd |
bind-utils-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 2974c1f1123d52aabd525a5760c6a8c8177e22c0ad56519bbe179e608a3f3674 |
caching-nameserver-9.3.6-4.P1.el5_4.2.s390x.rpm | SHA-256: 00d208fc457b8d3d37f45de210eaa043343318709ec68741895d12db90641a6b |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
ppc | |
bind-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 954d2cd6aed74b9515582c0f278e526f99342bae48a1e3240a9fcdea2f27b545 |
bind-chroot-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 1508f6a0fbafd25c3104a6e4a753ee6d7a73ae27b8e24e64310d8a511943e000 |
bind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 54343bd18787216afb03e6673f421db3051b8a8f38a5f882dc1f404790341520 |
bind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm | SHA-256: 7fd82005a43a21927b31aa42f6e70ecfb683bcb44fb18f8644bd686052111a27 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 01c769d83f8f7cd73ffabe2eee6a227542c6cbab4aad78819c4a2c47b0036f70 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm | SHA-256: d659527ffa93729fed25e3bb2611de1eb4375d6239b852aeedf41a3e15bd523e |
bind-libs-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: b469f9d7754d6d5bc5a81c1ab48d096c2d09d9dc904b92d5687c77294b94425e |
bind-libs-9.3.6-4.P1.el5_4.2.ppc64.rpm | SHA-256: 088461ab0ba6886be70841c9ec9f75bb50ea9cfe5960915dc55a146266f0b701 |
bind-sdb-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 98cd948811f5016ae1e4090cc5f92df2553193c473acd5a4d7de59c00f75fc92 |
bind-utils-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 10307e05f4c8c3d13568aee9b791485c2c2a540c9145ea3d0b7b34c0433aaafc |
caching-nameserver-9.3.6-4.P1.el5_4.2.ppc.rpm | SHA-256: 236d2bd517ae974be3d1a651d95ed9f1c2386971a461e1b08bdd1e0f8c0047ca |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4
SRPM | |
---|---|
ppc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
bind-9.3.6-4.P1.el5_4.2.src.rpm | SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63 |
x86_64 | |
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2 |
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87 |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741 |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1 |
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd |
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05 |
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm | SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd |
i386 | |
bind-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c |
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e |
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611 |
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c |
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6 |
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b |
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f |
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm | SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.