Vulnerabilities > CVE-2018-5741 - Incorrect Authorization vulnerability in ISC Bind

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
isc
CWE-863
nessus

Summary

To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.

Vulnerable Configurations

Part Description Count
Application
Isc
873

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-2057.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind (9.11.4). (BZ#1640561) Security Fix(es) : * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id127663
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127663
    titleRHEL 7 : bind (RHSA-2019:2057)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-54D84B0B0C.NASL
    descriptionUpdate to bind 9.11.4-P2 - Fixes CVE-2018-5741 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-10-15
    plugin id118101
    published2018-10-15
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118101
    titleFedora 27 : 32:bind (2018-54d84b0b0c)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2128.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : -
    last seen2020-05-08
    modified2019-11-12
    plugin id130837
    published2019-11-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130837
    titleEulerOS 2.0 SP5 : bind (EulerOS-SA-2019-2128)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0232_BIND.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has bind packages installed that are affected by a vulnerability: - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3. (CVE-2018-5741) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id132476
    published2019-12-31
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132476
    titleNewStart CGSL CORE 5.05 / MAIN 5.05 : bind Vulnerability (NS-SA-2019-0232)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201903-13.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201903-13 (BIND: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. Impact : BIND can improperly permit recursive query service to unauthorized clients possibly resulting in a Denial of Service condition or to be used in DNS reflection attacks. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id122835
    published2019-03-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122835
    titleGLSA-201903-13 : BIND: Multiple vulnerabilities
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2019-1187.NASL
    descriptionTo provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. (CVE-2018-5741)
    last seen2020-06-01
    modified2020-06-02
    plugin id123956
    published2019-04-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123956
    titleAmazon Linux AMI : bind (ALAS-2019-1187)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2557.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : -
    last seen2020-05-08
    modified2019-12-19
    plugin id132274
    published2019-12-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132274
    titleEulerOS 2.0 SP3 : bind (EulerOS-SA-2019-2557)
  • NASL familyDNS
    NASL idBIND9_CVE-2018-5741.NASL
    descriptionAccording to its self-reported version number, the instance of ISC 9.x.x prior to 9.11.5, or 9.12.x prior to 9.12.3. It is, therefore, affected by a policy bypass record update vulnerability.
    last seen2020-06-01
    modified2020-06-02
    plugin id119264
    published2018-11-28
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119264
    titleISC BIND 9.x.x < 9.11.5 / 9.12.x < 9.12.3 Policy-Bypass Record Update Vulnerability
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1187.NASL
    descriptionTo provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were.(CVE-2018-5741)
    last seen2020-06-01
    modified2020-06-02
    plugin id124123
    published2019-04-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124123
    titleAmazon Linux 2 : bind (ALAS-2019-1187)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0191_BIND.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has bind packages installed that are affected by a vulnerability: - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3. (CVE-2018-5741) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id129892
    published2019-10-15
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129892
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : bind Vulnerability (NS-SA-2019-0191)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1460.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.(CVE-2016-6170) - It was found that the controls for zone transfer were not properly applied to Dynamically Loadable Zones (DLZs). An attacker acting as a DNS client could use this flaw to request and receive a zone transfer of a DLZ even when not permitted to do so by the
    last seen2020-04-30
    modified2020-04-16
    plugin id135622
    published2020-04-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135622
    titleEulerOS Virtualization 3.0.2.2 : bind (EulerOS-SA-2020-1460)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-F22B937F52.NASL
    description - Update to bind-9.11.4-P2 - Add /dev/urandom to chroot (#1631515) - Fix multilib conflicts of devel package - Add support for OpenSSL provided random data Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2019-01-03
    plugin id120900
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120900
    titleFedora 28 : 32:bind (2018-f22b937f52)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-2057.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind (9.11.4). (BZ#1640561) Security Fix(es) : * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id128344
    published2019-08-30
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128344
    titleCentOS 7 : bind (CESA-2019:2057)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190806_BIND_ON_SL7_X.NASL
    descriptionThe following packages have been upgraded to a later upstream version: bind (9.11.4). Security Fix(es) : - bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741)
    last seen2020-03-18
    modified2019-08-27
    plugin id128208
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128208
    titleScientific Linux Security Update : bind on SL7.x x86_64 (20190806)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-A54E46032F.NASL
    description - Update to bind-9.11.4-P2 - Add /dev/urandom to chroot (#1631515) - Fix multilib conflicts of devel package - Add support for OpenSSL provided random data Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2019-01-03
    plugin id120673
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120673
    titleFedora 29 : 32:bind (2018-a54e46032f)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1203.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - It was found that bind does not implement reasonable restrictions for zone sizes. This allows an explicitly configured primary DNS server for a zone to crash a secondary DNS server, affecting service of other zones hosted on the same secondary server.(CVE-2016-6170) - Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.(CVE-2019-6465) - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) -
    last seen2020-03-19
    modified2020-03-13
    plugin id134492
    published2020-03-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134492
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : bind (EulerOS-SA-2020-1203)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2453.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) -
    last seen2020-05-08
    modified2019-12-04
    plugin id131607
    published2019-12-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131607
    titleEulerOS 2.0 SP2 : bind (EulerOS-SA-2019-2453)

Redhat

advisories
bugzilla
id1720703
titleLatest bind (9.9) update now causes zone transfer to always fail.
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 7 is installed
      ovaloval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • commentbind-license is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057001
        • commentbind-license is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767022
      • AND
        • commentbind-export-libs is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057003
        • commentbind-export-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145002
      • AND
        • commentbind-libs is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057005
        • commentbind-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651010
      • AND
        • commentbind-libs-lite is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057007
        • commentbind-libs-lite is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767024
      • AND
        • commentbind-utils is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057009
        • commentbind-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651012
      • AND
        • commentbind-pkcs11 is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057011
        • commentbind-pkcs11 is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767020
      • AND
        • commentbind-lite-devel is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057013
        • commentbind-lite-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767016
      • AND
        • commentbind-chroot is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057015
        • commentbind-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651008
      • AND
        • commentbind-pkcs11-libs is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057017
        • commentbind-pkcs11-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767006
      • AND
        • commentbind-pkcs11-devel is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057019
        • commentbind-pkcs11-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767004
      • AND
        • commentbind-pkcs11-utils is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057021
        • commentbind-pkcs11-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767014
      • AND
        • commentbind is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057023
        • commentbind is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651006
      • AND
        • commentbind-export-devel is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057025
        • commentbind-export-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145006
      • AND
        • commentbind-devel is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057027
        • commentbind-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651004
      • AND
        • commentbind-sdb-chroot is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057029
        • commentbind-sdb-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767018
      • AND
        • commentbind-sdb is earlier than 32:9.11.4-9.P2.el7
          ovaloval:com.redhat.rhsa:tst:20192057031
        • commentbind-sdb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651002
rhsa
idRHSA-2019:2057
released2019-08-06
severityModerate
titleRHSA-2019:2057: bind security, bug fix, and enhancement update (Moderate)
rpms
  • bind-32:9.11.4-9.P2.el7
  • bind-chroot-32:9.11.4-9.P2.el7
  • bind-debuginfo-32:9.11.4-9.P2.el7
  • bind-devel-32:9.11.4-9.P2.el7
  • bind-export-devel-32:9.11.4-9.P2.el7
  • bind-export-libs-32:9.11.4-9.P2.el7
  • bind-libs-32:9.11.4-9.P2.el7
  • bind-libs-lite-32:9.11.4-9.P2.el7
  • bind-license-32:9.11.4-9.P2.el7
  • bind-lite-devel-32:9.11.4-9.P2.el7
  • bind-pkcs11-32:9.11.4-9.P2.el7
  • bind-pkcs11-devel-32:9.11.4-9.P2.el7
  • bind-pkcs11-libs-32:9.11.4-9.P2.el7
  • bind-pkcs11-utils-32:9.11.4-9.P2.el7
  • bind-sdb-32:9.11.4-9.P2.el7
  • bind-sdb-chroot-32:9.11.4-9.P2.el7
  • bind-utils-32:9.11.4-9.P2.el7