Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Published: 2019-01-16
Updated: 2020-10-20
Summary
To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
Vulnerable Configurations
Part | Description | Count |
Application | Isc | 1374 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2019-2057.NASL |
description | An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind (9.11.4). (BZ#1640561) Security Fix(es) : * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 127663 |
published | 2019-08-12 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/127663 |
title | RHEL 7 : bind (RHSA-2019:2057) |
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2018-54D84B0B0C.NASL |
description | Update to bind 9.11.4-P2 - Fixes CVE-2018-5741 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2018-10-15 |
plugin id | 118101 |
published | 2018-10-15 |
reporter | This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/118101 |
title | Fedora 27 : 32:bind (2018-54d84b0b0c) |
NASL family | Huawei Local Security Checks |
NASL id | EULEROS_SA-2019-2128.NASL |
description | According to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - |
last seen | 2020-05-08 |
modified | 2019-11-12 |
plugin id | 130837 |
published | 2019-11-12 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/130837 |
title | EulerOS 2.0 SP5 : bind (EulerOS-SA-2019-2128) |
NASL family | NewStart CGSL Local Security Checks |
NASL id | NEWSTART_CGSL_NS-SA-2019-0232_BIND.NASL |
description | The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has bind packages installed that are affected by a vulnerability: - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3. (CVE-2018-5741) Note that Nessus has not tested for this issue but has instead relied only on the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 132476 |
published | 2019-12-31 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/132476 |
title | NewStart CGSL CORE 5.05 / MAIN 5.05 : bind Vulnerability (NS-SA-2019-0232) |
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-201903-13.NASL |
description | The remote host is affected by the vulnerability described in GLSA-201903-13 (BIND: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. Impact : BIND can improperly permit recursive query service to unauthorized clients possibly resulting in a Denial of Service condition or to be used in DNS reflection attacks. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 122835 |
published | 2019-03-14 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/122835 |
title | GLSA-201903-13 : BIND: Multiple vulnerabilities |
NASL family | Amazon Linux Local Security Checks |
NASL id | ALA_ALAS-2019-1187.NASL |
description | To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. (CVE-2018-5741) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 123956 |
published | 2019-04-10 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/123956 |
title | Amazon Linux AMI : bind (ALAS-2019-1187) |
NASL family | Huawei Local Security Checks |
NASL id | EULEROS_SA-2019-2557.NASL |
description | According to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - |
last seen | 2020-05-08 |
modified | 2019-12-19 |
plugin id | 132274 |
published | 2019-12-19 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/132274 |
title | EulerOS 2.0 SP3 : bind (EulerOS-SA-2019-2557) |
NASL family | DNS |
NASL id | BIND9_CVE-2018-5741.NASL |
description | According to its self-reported version number, the instance of ISC 9.x.x prior to 9.11.5, or 9.12.x prior to 9.12.3. It is, therefore, affected by a policy bypass record update vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 119264 |
published | 2018-11-28 |
reporter | This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/119264 |
title | ISC BIND 9.x.x < 9.11.5 / 9.12.x < 9.12.3 Policy-Bypass Record Update Vulnerability |
NASL family | Amazon Linux Local Security Checks |
NASL id | AL2_ALAS-2019-1187.NASL |
description | To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were.(CVE-2018-5741) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 124123 |
published | 2019-04-18 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/124123 |
title | Amazon Linux 2 : bind (ALAS-2019-1187) |
NASL family | NewStart CGSL Local Security Checks |
NASL id | NEWSTART_CGSL_NS-SA-2019-0191_BIND.NASL |
description | The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has bind packages installed that are affected by a vulnerability: - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3. (CVE-2018-5741) Note that Nessus has not tested for this issue but has instead relied only on the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 129892 |
published | 2019-10-15 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/129892 |
title | NewStart CGSL CORE 5.04 / MAIN 5.04 : bind Vulnerability (NS-SA-2019-0191) |
NASL family | Huawei Local Security Checks |
NASL id | EULEROS_SA-2020-1460.NASL |
description | According to the versions of the bind packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.(CVE-2016-6170) - It was found that the controls for zone transfer were not properly applied to Dynamically Loadable Zones (DLZs). An attacker acting as a DNS client could use this flaw to request and receive a zone transfer of a DLZ even when not permitted to do so by the |
last seen | 2020-04-30 |
modified | 2020-04-16 |
plugin id | 135622 |
published | 2020-04-16 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/135622 |
title | EulerOS Virtualization 3.0.2.2 : bind (EulerOS-SA-2020-1460) |
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2018-F22B937F52.NASL |
description | - Update to bind-9.11.4-P2 - Add /dev/urandom to chroot (#1631515) - Fix multilib conflicts of devel package - Add support for OpenSSL provided random data Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2019-01-03 |
plugin id | 120900 |
published | 2019-01-03 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/120900 |
title | Fedora 28 : 32:bind (2018-f22b937f52) |
NASL family | CentOS Local Security Checks |
NASL id | CENTOS_RHSA-2019-2057.NASL |
description | An update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind (9.11.4). (BZ#1640561) Security Fix(es) : * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 128344 |
published | 2019-08-30 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/128344 |
title | CentOS 7 : bind (CESA-2019:2057) |
NASL family | Scientific Linux Local Security Checks |
NASL id | SL_20190806_BIND_ON_SL7_X.NASL |
description | The following packages have been upgraded to a later upstream version: bind (9.11.4). Security Fix(es) : - bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741) |
last seen | 2020-03-18 |
modified | 2019-08-27 |
plugin id | 128208 |
published | 2019-08-27 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/128208 |
title | Scientific Linux Security Update : bind on SL7.x x86_64 (20190806) |
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2018-A54E46032F.NASL |
description | - Update to bind-9.11.4-P2 - Add /dev/urandom to chroot (#1631515) - Fix multilib conflicts of devel package - Add support for OpenSSL provided random data Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2019-01-03 |
plugin id | 120673 |
published | 2019-01-03 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/120673 |
title | Fedora 29 : 32:bind (2018-a54e46032f) |
NASL family | Huawei Local Security Checks |
NASL id | EULEROS_SA-2020-1203.NASL |
description | According to the versions of the bind packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - It was found that bind does not implement reasonable restrictions for zone sizes. This allows an explicitly configured primary DNS server for a zone to crash a secondary DNS server, affecting service of other zones hosted on the same secondary server.(CVE-2016-6170) - Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.(CVE-2019-6465) - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) - |
last seen | 2020-03-19 |
modified | 2020-03-13 |
plugin id | 134492 |
published | 2020-03-13 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/134492 |
title | EulerOS Virtualization for ARM 64 3.0.2.0 : bind (EulerOS-SA-2020-1203) |
NASL family | Huawei Local Security Checks |
NASL id | EULEROS_SA-2019-2453.NASL |
description | According to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) - |
last seen | 2020-05-08 |
modified | 2019-12-04 |
plugin id | 131607 |
published | 2019-12-04 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/131607 |
title | EulerOS 2.0 SP2 : bind (EulerOS-SA-2019-2453) |
Redhat
advisories | bugzilla | id | 1720703 | title | Latest bind (9.9) update now causes zone transfer to always fail. |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 7 is installed | oval | oval:com.redhat.rhba:tst:20150364027 |
OR | AND | comment | bind-license is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057001 |
comment | bind-license is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767022 |
|
AND | comment | bind-export-libs is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057003 |
comment | bind-export-libs is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20191145002 |
|
AND | comment | bind-libs is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057005 |
comment | bind-libs is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651010 |
|
AND | comment | bind-libs-lite is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057007 |
comment | bind-libs-lite is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767024 |
|
AND | comment | bind-utils is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057009 |
comment | bind-utils is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651012 |
|
AND | comment | bind-pkcs11 is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057011 |
comment | bind-pkcs11 is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767020 |
|
AND | comment | bind-lite-devel is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057013 |
comment | bind-lite-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767016 |
|
AND | comment | bind-chroot is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057015 |
comment | bind-chroot is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651008 |
|
AND | comment | bind-pkcs11-libs is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057017 |
comment | bind-pkcs11-libs is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767006 |
|
AND | comment | bind-pkcs11-devel is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057019 |
comment | bind-pkcs11-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767004 |
|
AND | comment | bind-pkcs11-utils is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057021 |
comment | bind-pkcs11-utils is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767014 |
|
AND | comment | bind is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057023 |
comment | bind is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651006 |
|
AND | comment | bind-export-devel is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057025 |
comment | bind-export-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20191145006 |
|
AND | comment | bind-devel is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057027 |
comment | bind-devel is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651004 |
|
AND | comment | bind-sdb-chroot is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057029 |
comment | bind-sdb-chroot is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20171767018 |
|
AND | comment | bind-sdb is earlier than 32:9.11.4-9.P2.el7 | oval | oval:com.redhat.rhsa:tst:20192057031 |
comment | bind-sdb is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhba:tst:20170651002 |
|
|
|
|
| rhsa | id | RHSA-2019:2057 | released | 2019-08-06 | severity | Moderate | title | RHSA-2019:2057: bind security, bug fix, and enhancement update (Moderate) |
|
|
rpms | - bind-32:9.11.4-9.P2.el7
- bind-chroot-32:9.11.4-9.P2.el7
- bind-debuginfo-32:9.11.4-9.P2.el7
- bind-devel-32:9.11.4-9.P2.el7
- bind-export-devel-32:9.11.4-9.P2.el7
- bind-export-libs-32:9.11.4-9.P2.el7
- bind-libs-32:9.11.4-9.P2.el7
- bind-libs-lite-32:9.11.4-9.P2.el7
- bind-license-32:9.11.4-9.P2.el7
- bind-lite-devel-32:9.11.4-9.P2.el7
- bind-pkcs11-32:9.11.4-9.P2.el7
- bind-pkcs11-devel-32:9.11.4-9.P2.el7
- bind-pkcs11-libs-32:9.11.4-9.P2.el7
- bind-pkcs11-utils-32:9.11.4-9.P2.el7
- bind-sdb-32:9.11.4-9.P2.el7
- bind-sdb-chroot-32:9.11.4-9.P2.el7
- bind-utils-32:9.11.4-9.P2.el7
|