Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0062 - Security Advisory
Issued:
2010-01-20
Updated:
2010-01-20

RHSA-2010:0062 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: bind security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated bind packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was
running as a DNSSEC-validating resolver, it could incorrectly cache
NXDOMAIN responses, as if they were valid, for records proven by NSEC or
NSEC3 to exist. A remote attacker could use this flaw to cause a BIND
server to return the bogus, cached NXDOMAIN responses for valid records and
prevent users from retrieving those records (denial of service).
(CVE-2010-0097)

The original fix for CVE-2009-4022 was found to be incomplete. BIND was
incorrectly caching certain responses without performing proper DNSSEC
validation. CNAME and DNAME records could be cached, without proper DNSSEC
validation, when received from processing recursive client queries that
requested DNSSEC records but indicated that checking should be disabled. A
remote attacker could use this flaw to bypass the DNSSEC validation check
and perform a cache poisoning attack if the target BIND server was
receiving such client queries. (CVE-2010-0290)

All BIND users are advised to upgrade to these updated packages, which
contain a backported patch to resolve these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 554851 - CVE-2010-0097 BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses
  • BZ - 557121 - CVE-2010-0290 BIND upstream fix for CVE-2009-4022 is incomplete

CVEs

  • CVE-2010-0097
  • CVE-2010-0290
  • CVE-2010-0382

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
x86_64
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd
ia64
bind-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: e0b39debee1c9be5f9417e94572c984e237740899db6594e88e5223489083285
bind-chroot-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: 7246a4a51f525ff3e0fd099e9b0a01bda5ff520e9ca2d44bcf16a3796974dfef
bind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: 9e8d4fa6ff083f32bd2963844c3ba9edf2b93d74c842e9b42293912e977e7aec
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: 43d6625b0dace9666e0ecbddce1fbbbff6d59607a4094b92e384e28239e24b2a
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-libs-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: 10cd33f545fca8b1829ff15f4f23d280953c55e38474199836976e5c4f19bb12
bind-sdb-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: aa062addc0af3b16c5b08b3c7411b83c6e738cf16f2691a9ec738c65b90d9bcf
bind-utils-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: 5494ac9cea6d88eaec64dd4d2480b89c92d515846cd7902db202ef8134afeeec
caching-nameserver-9.3.6-4.P1.el5_4.2.ia64.rpm SHA-256: fd3b7542b69f38b865759192d08513c51370b837ea8a515617aabd45dfd5eecd
i386
bind-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
x86_64
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd
i386
bind-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47

Red Hat Enterprise Linux Desktop 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
x86_64
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05
i386
bind-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
s390x
bind-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 4a9dac72a3fb6aa048f7c9c57ec064a62a7096c897da8f6895de51990f6b7ba6
bind-chroot-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 9c586ed7adf595dad74924f3fb6d4e3883feab07c29a993da0c89ef30814d1e5
bind-devel-9.3.6-4.P1.el5_4.2.s390.rpm SHA-256: 2c704f5d3f7335d35bfd12afdaac5012398b335869cfe570ba7838a7182640dd
bind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 92dbc15ac3e709f30f6c9d9847e00aa6fd064c465deab0f40d7e7da25179bf47
bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390.rpm SHA-256: c3c80ba18c8b9f24d2aefd3d604118dc11ff7ad727d3ef9d50f29f8b64853196
bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: f6af5cf46f6c18f57ec0e02edc1dd6c5ed8a1b04511272de10b13d48fdaefdac
bind-libs-9.3.6-4.P1.el5_4.2.s390.rpm SHA-256: 183b690bf64f34ca3e13dcc89057240b29c065236d5824b4d610b0520a542b9d
bind-libs-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 68d8c83e30fab1df998318ab522cb5e31e2db4a994823debac8252fa3dda5561
bind-sdb-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 306ccb8599645af4d67bf0dc003f4b5993a86ce2aa41d2c4550506c7502950bd
bind-utils-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 2974c1f1123d52aabd525a5760c6a8c8177e22c0ad56519bbe179e608a3f3674
caching-nameserver-9.3.6-4.P1.el5_4.2.s390x.rpm SHA-256: 00d208fc457b8d3d37f45de210eaa043343318709ec68741895d12db90641a6b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
ppc
bind-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 954d2cd6aed74b9515582c0f278e526f99342bae48a1e3240a9fcdea2f27b545
bind-chroot-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 1508f6a0fbafd25c3104a6e4a753ee6d7a73ae27b8e24e64310d8a511943e000
bind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 54343bd18787216afb03e6673f421db3051b8a8f38a5f882dc1f404790341520
bind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm SHA-256: 7fd82005a43a21927b31aa42f6e70ecfb683bcb44fb18f8644bd686052111a27
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 01c769d83f8f7cd73ffabe2eee6a227542c6cbab4aad78819c4a2c47b0036f70
bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm SHA-256: d659527ffa93729fed25e3bb2611de1eb4375d6239b852aeedf41a3e15bd523e
bind-libs-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: b469f9d7754d6d5bc5a81c1ab48d096c2d09d9dc904b92d5687c77294b94425e
bind-libs-9.3.6-4.P1.el5_4.2.ppc64.rpm SHA-256: 088461ab0ba6886be70841c9ec9f75bb50ea9cfe5960915dc55a146266f0b701
bind-sdb-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 98cd948811f5016ae1e4090cc5f92df2553193c473acd5a4d7de59c00f75fc92
bind-utils-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 10307e05f4c8c3d13568aee9b791485c2c2a540c9145ea3d0b7b34c0433aaafc
caching-nameserver-9.3.6-4.P1.el5_4.2.ppc.rpm SHA-256: 236d2bd517ae974be3d1a651d95ed9f1c2386971a461e1b08bdd1e0f8c0047ca

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
bind-9.3.6-4.P1.el5_4.2.src.rpm SHA-256: 1f7f67cccffb2c6d91937d3bfd71cf407cd6cc098654dec3d0a05e6ac331de63
x86_64
bind-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9fffb221bad61644e4c3a989b116051d02f2ba3f27317d4a244302dd12397be2
bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 7f3113d23593f27032df7cd65b9b0df2aee156c3d375a441c4c7f53918268d87
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: bf635d2f43bcd2ee93404bc7fc6c862463db00f8f054642ed578b41a6f13690c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 6ddab311fb8a7289ac2b2ff13eef5cbd3d2e8a11e2934d3820dd3cb5a8d92741
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: aac7264a4e51c808f89352d323c0eb8ddbff66080b37541c8aa1e5380b921aa1
bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 2394f948cd29572b3e3f834ad72b23f4ec9f97545f8af3a12f5ad3878cdbb8cd
bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: c23d6b0215c79505641ae49b6a70372f8028273a782465b180231f5b7061cf05
caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm SHA-256: 9379c28f9907173d74e83a87a9680ef561fa1e297d8e6961ab89fff4e23059bd
i386
bind-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 62a9a15d48c778a2fe41d4b54b3b8179e13e3ec15ed65ba64936eebb923e1d5c
bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: f9d98e04d5bf04f5bb51493efd02f0426f47f41f14e891b7f702c4151098e59e
bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: da5f3425ff4020f95e7cd2415492cf7a626149414a4bcb0e4a08f62355edd611
bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 6c3c26c7a2e23d30052a6dfdfc01cb93c8229811c9c7490657bb21be55cd210c
bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 782ef5af738f58fe4427e904521f52f5a430fe88cc87113f235ded6cbeff0fc6
bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 24f6650234b143bd75e9f2e2bd505cc28737b6681aff944b6805adc9d638a71b
bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 021674e1fb31ac10f4f91e092b226fe2f41393cfa4eef2404dfcdfacd674c17f
caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm SHA-256: 9fc668272db28daf3e68a530cb4a45156a7f1d934a35404def568abcd2c35b47

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility