Vulnerabilities > CVE-2019-6465 - Incorrect Permission Assignment for Critical Resource vulnerability in multiple products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
isc
redhat
CWE-732
nessus

Summary

Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Accessing Functionality Not Properly Constrained by ACLs
    In applications, particularly web applications, access to functionality is mitigated by the authorization framework, whose job it is to map ACLs to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be available only to users at a higher privilege level, can access management sections of the application or can run queries for data that he is otherwise not supposed to.
  • Privilege Abuse
    An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources. If access control mechanisms are absent or misconfigured, a user may be able to access resources that are intended only for higher level users. An adversary may be able to exploit this to utilize a less trusted account to gain information and perform activities reserved for more trusted accounts. This attack differs from privilege escalation and other privilege stealing attacks in that the adversary never actually escalates their privileges but instead is able to use a lesser degree of privilege to access resources that should be (but are not) reserved for higher privilege accounts. Likewise, the adversary does not exploit trust or subvert systems - all control functionality is working as configured but the configuration does not adequately protect sensitive resources at an appropriate level.
  • Directory Indexing
    An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files, configuration files, user accounts, script contents, as well as naming conventions, all of which can be used by an attacker to mount additional attacks.
  • Accessing, Modifying or Executing Executable Files
    An attack of this type exploits a system's configuration that allows an attacker to either directly access an executable file, for example through shell access; or in a possible worst case allows an attacker to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.
  • Exploiting Incorrectly Configured Access Control Security Levels
    An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack. Most commonly, attackers would take advantage of controls that provided too little protection for sensitive activities in order to perform actions that should be denied to them. In some circumstances, an attacker may be able to take advantage of overly restrictive access control policies, initiating denial of services (if an application locks because it unexpectedly failed to be granted access) or causing other legitimate actions to fail due to security. The latter class of attacks, however, is usually less severe and easier to detect than attacks based on inadequate security restrictions. This attack pattern differs from CAPEC 1, "Accessing Functionality Not Properly Constrained by ACLs" in that the latter describes attacks where sensitive functionality lacks access controls, where, in this pattern, the access control is present, but incorrectly configured.

Nessus

  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL01713115.NASL
    descriptionControls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465. (CVE-2019-6465) Impact BIG-IP An attacker can exploit this vulnerabilitytorequest and receive a zonetransfer of a DLZ that bypassestheallow-transfer accesscontrol list. BIG-IQ, F5 iWorkflow, and Enterprise Manager These F5 products are not vulnerablein the default, standard, and recommended configurations. This vulnerability is exposed on these products when a custom configurationis applied to the named service. Traffix SDC There is no impact for this F5 product; it is not affected by this vulnerability.
    last seen2020-03-17
    modified2019-03-04
    plugin id122553
    published2019-03-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122553
    titleF5 Networks BIG-IP : BIND vulnerability (K01713115)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from F5 Networks BIG-IP Solution K01713115.
    #
    # The text description of this plugin is (C) F5 Networks.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(122553);
      script_version("1.11");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/09");
    
      script_cve_id("CVE-2019-6465");
    
      script_name(english:"F5 Networks BIG-IP : BIND vulnerability (K01713115)");
      script_summary(english:"Checks the BIG-IP version.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote device is missing a vendor-supplied security patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Controls for zone transfers may not be properly applied to Dynamically
    Loadable Zones (DLZs) if the zones are writable Versions affected:
    BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and
    versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition.
    Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also
    affected. Versions prior to BIND 9.9.0 have not been evaluated for
    vulnerability to CVE-2019-6465. (CVE-2019-6465)
    
    Impact
    
    BIG-IP
    
    An attacker can exploit this vulnerabilitytorequest and receive a
    zonetransfer of a DLZ that bypassestheallow-transfer accesscontrol
    list.
    
    BIG-IQ, F5 iWorkflow, and Enterprise Manager
    
    These F5 products are not vulnerablein the default, standard, and
    recommended configurations. This vulnerability is exposed on these
    products when a custom configurationis applied to the named service.
    
    Traffix SDC
    
    There is no impact for this F5 product; it is not affected by this
    vulnerability."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://support.f5.com/csp/article/K01713115"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade to one of the non-vulnerable versions listed in the F5
    Solution K01713115."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_webaccelerator");
      script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/09");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/02/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/04");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"F5 Networks Local Security Checks");
    
      script_dependencies("f5_bigip_detect.nbin");
      script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version");
    
      exit(0);
    }
    
    
    include("f5_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    version = get_kb_item("Host/BIG-IP/version");
    if ( ! version ) audit(AUDIT_OS_NOT, "F5 Networks BIG-IP");
    if ( isnull(get_kb_item("Host/BIG-IP/hotfix")) ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/hotfix");
    if ( ! get_kb_item("Host/BIG-IP/modules") ) audit(AUDIT_KB_MISSING, "Host/BIG-IP/modules");
    
    sol = "K01713115";
    vmatrix = make_array();
    
    # AFM
    vmatrix["AFM"] = make_array();
    vmatrix["AFM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["AFM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # AM
    vmatrix["AM"] = make_array();
    vmatrix["AM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["AM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # APM
    vmatrix["APM"] = make_array();
    vmatrix["APM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["APM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # ASM
    vmatrix["ASM"] = make_array();
    vmatrix["ASM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["ASM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # AVR
    vmatrix["AVR"] = make_array();
    vmatrix["AVR"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["AVR"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # GTM
    vmatrix["GTM"] = make_array();
    vmatrix["GTM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["GTM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # LC
    vmatrix["LC"] = make_array();
    vmatrix["LC"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["LC"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # LTM
    vmatrix["LTM"] = make_array();
    vmatrix["LTM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["LTM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # PEM
    vmatrix["PEM"] = make_array();
    vmatrix["PEM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["PEM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    # WAM
    vmatrix["WAM"] = make_array();
    vmatrix["WAM"]["affected"  ] = make_list("14.0.0-14.1.0","13.0.0-13.1.1","12.1.0-12.1.4","11.6.1-11.6.3","11.5.1-11.5.8");
    vmatrix["WAM"]["unaffected"] = make_list("15.0.0","14.1.0.2","13.1.1.5","12.1.4.1","11.6.4","11.5.9");
    
    
    if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
    {
      if (report_verbosity > 0) security_warning(port:0, extra:bigip_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = bigip_get_tested_modules();
      audit_extra = "For BIG-IP module(s) " + tested + ",";
      if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
      else audit(AUDIT_HOST_NOT, "running any of the affected modules");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2321.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is that if an operator has not specified a value for the
    last seen2020-06-01
    modified2020-06-02
    plugin id131486
    published2019-12-03
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131486
    titleEulerOS Virtualization for ARM 64 3.0.3.0 : bind (EulerOS-SA-2019-2321)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(131486);
      script_version("1.2");
      script_cvs_date("Date: 2019/12/10");
    
      script_cve_id(
        "CVE-2018-5738",
        "CVE-2018-5745",
        "CVE-2019-6465"
      );
    
      script_name(english:"EulerOS Virtualization for ARM 64 3.0.3.0 : bind (EulerOS-SA-2019-2321)");
      script_summary(english:"Checks the rpm output for the updated packages.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote EulerOS Virtualization for ARM 64 host is missing multiple security
    updates.");
      script_set_attribute(attribute:"description", value:
    "According to the versions of the bind packages installed, the EulerOS
    Virtualization for ARM 64 installation on the remote host is affected
    by the following vulnerabilities :
    
      - Change #4777 (introduced in October 2017) introduced an
        unforeseen issue in releases which were issued after
        that date, affecting which clients are permitted to
        make recursive queries to a BIND nameserver. The
        intended (and documented) behavior is that if an
        operator has not specified a value for the
        'allow-recursion' setting, it SHOULD default to one of
        the following: none, if 'recursion no' is set in
        named.conf a value inherited from the
        'allow-query-cache' or 'allow-query' settings IF
        'recursion yes' (the default for that setting) AND
        match lists are explicitly set for 'allow-query-cache'
        or 'allow-query' (see the BIND9 Administrative
        Reference Manual section 6.2 for more details) or the
        intended default of 'allow-recursion {localhost
        localnets}' if 'recursion yes' is in effect and no
        values are explicitly set for 'allow-query-cache' or
        'allow-query'. However, because of the regression
        introduced by change #4777, it is possible when
        'recursion yes' is in effect and no match list values
        are provided for 'allow-query-cache' or 'allow-query'
        for the setting of 'allow-recursion' to inherit a
        setting of all hosts from the 'allow-query' setting
        default, improperly permitting recursion to all
        clients. Affects BIND 9.9.12, 9.10.7, 9.11.3,
        9.12.0->9.12.1-P2, the development release 9.13.0, and
        also releases 9.9.12-S1, 9.10.7-S1, 9.11.3-S1, and
        9.11.3-S2 from BIND 9 Supported Preview
        Edition.(CVE-2018-5738)
    
      - Controls for zone transfers may not be properly applied
        to Dynamically Loadable Zones (DLZs) if the zones are
        writable Versions affected: BIND 9.9.0 -> 9.10.8-P1,
        9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions
        9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview
        Edition. Versions 9.13.0 -> 9.13.6 of the 9.13
        development branch are also affected. Versions prior to
        BIND 9.9.0 have not been evaluated for vulnerability to
        CVE-2019-6465.(CVE-2019-6465)
    
      - 'managed-keys' is a feature which allows a BIND
        resolver to automatically maintain the keys used by
        trust anchors which operators configure for use in
        DNSSEC validation. Due to an error in the managed-keys
        feature it is possible for a BIND server which uses
        managed-keys to exit due to an assertion failure if,
        during key rollover, a trust anchor's keys are replaced
        with keys which use an unsupported algorithm. Versions
        affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1,
        9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3
        of BIND 9 Supported Preview Edition. Versions 9.13.0 ->
        9.13.6 of the 9.13 development branch are also
        affected. Versions prior to BIND 9.9.0 have not been
        evaluated for vulnerability to
        CVE-2018-5745.(CVE-2018-5745)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the EulerOS security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues.");
      # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2321
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b3f1b816");
      script_set_attribute(attribute:"solution", value:
    "Update the affected bind packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2019/12/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/03");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-export-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-libs-lite");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-license");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:bind-utils");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:python3-bind");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.3.0");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Huawei Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/EulerOS/release");
    if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
    uvp = get_kb_item("Host/EulerOS/uvp_version");
    if (uvp != "3.0.3.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.3.0");
    if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
    if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
    
    flag = 0;
    
    pkgs = ["bind-export-libs-9.11.4-10.P2.h12.eulerosv2r8",
            "bind-libs-9.11.4-10.P2.h12.eulerosv2r8",
            "bind-libs-lite-9.11.4-10.P2.h12.eulerosv2r8",
            "bind-license-9.11.4-10.P2.h12.eulerosv2r8",
            "bind-utils-9.11.4-10.P2.h12.eulerosv2r8",
            "python3-bind-9.11.4-10.P2.h12.eulerosv2r8"];
    
    foreach (pkg in pkgs)
      if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind");
    }
    
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2128.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : -
    last seen2020-05-08
    modified2019-11-12
    plugin id130837
    published2019-11-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130837
    titleEulerOS 2.0 SP5 : bind (EulerOS-SA-2019-2128)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1532.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : - CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id125807
    published2019-06-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125807
    titleopenSUSE Security Update : bind (openSUSE-2019-1532)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1533.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : - CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069). - CVE-2018-5745: Fixed a denial of service vulnerability if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (bsc#1126068). - CVE-2018-5743: Fixed a denial of service vulnerability which could be caused by to many simultaneous TCP connections (bsc#1133185). - CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id125808
    published2019-06-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125808
    titleopenSUSE Security Update : bind (openSUSE-2019-1533)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4440.NASL
    descriptionMultiple vulnerabilities were found in the BIND DNS server : - CVE-2018-5743 Connection limits were incorrectly enforced. - CVE-2018-5745 The
    last seen2020-06-01
    modified2020-06-02
    plugin id124722
    published2019-05-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124722
    titleDebian DSA-4440-1 : bind9 - security update
  • NASL familyDNS
    NASL idBIND9_CVE-2019-6465.NASL
    descriptionAccording to its self-reported version, the instance of ISC BIND 9 running on the remote name server is between 9.9.0 and 9.10.8-P1, 9.11.0 and 9.11.5-P2, 9.12.0 and 9.12.3-P2, 9.9.3-S1 and 9.11.5-S3, & 9.13.0 and 9.13.6. It is, therefore, affected by a zone transfer vulnerability. - A zone transfer vulnerability exists for writable DLZ zones. An unauthenticated, remote attacker can exploit this, via allowzonexfr method bypass, to bypass transfer controls. (CVE-2019-6465) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id122507
    published2019-03-01
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122507
    titleISC BIND Multiple Vulnerabilities
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-3893-1.NASL
    descriptionToshifumi Sakaguchi discovered that Bind incorrectly handled memory. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-5744) It was discovered that Bind incorrectly handled certain trust anchors when used with the
    last seen2020-06-01
    modified2020-06-02
    plugin id122399
    published2019-02-22
    reporterUbuntu Security Notice (C) 2019-2020 Canonical, Inc. / NASL script (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122399
    titleUbuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : bind9 vulnerabilities (USN-3893-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-1061.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1061 advisory. - bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (CVE-2018-5745) - bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable (CVE-2019-6465) - bind: TCP Pipelining doesn
    last seen2020-04-23
    modified2020-04-01
    plugin id135069
    published2020-04-01
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135069
    titleRHEL 7 : bind (RHSA-2020:1061)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1822.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - An assertion failure was found in the way bind implemented the
    last seen2020-05-03
    modified2019-08-27
    plugin id128191
    published2019-08-27
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/128191
    titleEulerOS 2.0 SP8 : bind (EulerOS-SA-2019-1822)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2557.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : -
    last seen2020-05-08
    modified2019-12-19
    plugin id132274
    published2019-12-19
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132274
    titleEulerOS 2.0 SP3 : bind (EulerOS-SA-2019-2557)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-3552.NASL
    descriptionAn update for bind is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es) : * bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (CVE-2018-5745) * bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable (CVE-2019-6465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id130551
    published2019-11-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130551
    titleRHEL 8 : bind (RHSA-2019:3552)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1407-1.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069). CVE-2018-5745: Fixed a denial of service vulnerability if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (bsc#1126068). CVE-2018-5743: Fixed a denial of service vulnerability which could be caused by to many simultaneous TCP connections (bsc#1133185). CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id125703
    published2019-06-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125703
    titleSUSE SLED15 / SLES15 Security Update : bind (SUSE-SU-2019:1407-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1449-1.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id125799
    published2019-06-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125799
    titleSUSE SLES12 Security Update : bind (SUSE-SU-2019:1449-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1697.NASL
    descriptionTwo issues have been found in bind9, the Internet Domain Name Server. CVE-2019-6465 Zone transfer for DLZs are executed though not permitted by ACLs. CVE-2018-5745 Avoid assertion and thus causing named to deliberately exit when a trust anchor
    last seen2020-06-01
    modified2020-06-02
    plugin id122513
    published2019-03-01
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122513
    titleDebian DLA-1697-1 : bind9 security updat
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-2502-1.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : CVE-2019-6465: Fixed an issue where controls for zone transfers may not be properly applied to Dynamically Loadable Zones (bsc#1126069). CVE-2019-6471: Fixed a reachable assert in dispatch.c. (bsc#1138687) CVE-2018-5745: Fixed a denial of service vulnerability if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (bsc#1126068). CVE-2018-5743: Fixed a denial of service vulnerability which could be caused by to many simultaneous TCP connections (bsc#1133185). CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id129526
    published2019-10-02
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129526
    titleSUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2019:2502-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2020-1061.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1061 advisory. - bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys (CVE-2018-5745) - bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writable (CVE-2019-6465) - bind: TCP Pipelining doesn
    last seen2020-06-06
    modified2020-04-10
    plugin id135328
    published2020-04-10
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135328
    titleCentOS 7 : bind (CESA-2020:1061)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20200407_BIND_ON_SL7_X.NASL
    description* bind: TCP Pipelining doesn
    last seen2020-04-30
    modified2020-04-21
    plugin id135801
    published2020-04-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135801
    titleScientific Linux Security Update : bind on SL7.x x86_64 (20200407)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1460.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.(CVE-2016-6170) - It was found that the controls for zone transfer were not properly applied to Dynamically Loadable Zones (DLZs). An attacker acting as a DNS client could use this flaw to request and receive a zone transfer of a DLZ even when not permitted to do so by the
    last seen2020-04-30
    modified2020-04-16
    plugin id135622
    published2020-04-16
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135622
    titleEulerOS Virtualization 3.0.2.2 : bind (EulerOS-SA-2020-1460)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-14074-1.NASL
    descriptionThis update for bind fixes the following issues : Security issues fixed : CVE-2018-5740: Fixed a denial of service vulnerability in the
    last seen2020-06-01
    modified2020-06-02
    plugin id125759
    published2019-06-07
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125759
    titleSUSE SLES11 Security Update : bind (SUSE-SU-2019:14074-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1203.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - It was found that bind does not implement reasonable restrictions for zone sizes. This allows an explicitly configured primary DNS server for a zone to crash a secondary DNS server, affecting service of other zones hosted on the same secondary server.(CVE-2016-6170) - Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.(CVE-2019-6465) - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) -
    last seen2020-03-19
    modified2020-03-13
    plugin id134492
    published2020-03-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134492
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : bind (EulerOS-SA-2020-1203)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-2453.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.(CVE-2018-5741) -
    last seen2020-05-08
    modified2019-12-04
    plugin id131607
    published2019-12-04
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131607
    titleEulerOS 2.0 SP2 : bind (EulerOS-SA-2019-2453)

Redhat

advisories
bugzilla
id1679307
titleidna system tests are failing, some names are not rejected
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 8 is installed
      ovaloval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • commentbind-debugsource is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552001
        • commentbind-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145004
      • AND
        • commentbind-export-libs is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552003
        • commentbind-export-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145002
      • AND
        • commentbind-export-devel is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552005
        • commentbind-export-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145006
      • AND
        • commentpython3-bind is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552007
        • commentpython3-bind is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhsa:tst:20191145008
      • AND
        • commentbind-license is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552009
        • commentbind-license is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767022
      • AND
        • commentbind-utils is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552011
        • commentbind-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651012
      • AND
        • commentbind-sdb-chroot is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552013
        • commentbind-sdb-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767018
      • AND
        • commentbind-sdb is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552015
        • commentbind-sdb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651002
      • AND
        • commentbind-pkcs11-utils is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552017
        • commentbind-pkcs11-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767014
      • AND
        • commentbind-pkcs11-libs is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552019
        • commentbind-pkcs11-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767006
      • AND
        • commentbind-pkcs11-devel is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552021
        • commentbind-pkcs11-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767004
      • AND
        • commentbind-pkcs11 is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552023
        • commentbind-pkcs11 is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767020
      • AND
        • commentbind-lite-devel is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552025
        • commentbind-lite-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767016
      • AND
        • commentbind-libs-lite is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552027
        • commentbind-libs-lite is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20171767024
      • AND
        • commentbind-libs is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552029
        • commentbind-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651010
      • AND
        • commentbind-devel is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552031
        • commentbind-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651004
      • AND
        • commentbind-chroot is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552033
        • commentbind-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651008
      • AND
        • commentbind is earlier than 32:9.11.4-26.P2.el8
          ovaloval:com.redhat.rhsa:tst:20193552035
        • commentbind is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651006
rhsa
idRHSA-2019:3552
released2019-11-05
severityLow
titleRHSA-2019:3552: bind security and bug fix update (Low)
rpms
  • bind-32:9.11.4-26.P2.el8
  • bind-chroot-32:9.11.4-26.P2.el8
  • bind-debuginfo-32:9.11.4-26.P2.el8
  • bind-debugsource-32:9.11.4-26.P2.el8
  • bind-devel-32:9.11.4-26.P2.el8
  • bind-export-devel-32:9.11.4-26.P2.el8
  • bind-export-libs-32:9.11.4-26.P2.el8
  • bind-export-libs-debuginfo-32:9.11.4-26.P2.el8
  • bind-libs-32:9.11.4-26.P2.el8
  • bind-libs-debuginfo-32:9.11.4-26.P2.el8
  • bind-libs-lite-32:9.11.4-26.P2.el8
  • bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8
  • bind-license-32:9.11.4-26.P2.el8
  • bind-lite-devel-32:9.11.4-26.P2.el8
  • bind-pkcs11-32:9.11.4-26.P2.el8
  • bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8
  • bind-pkcs11-devel-32:9.11.4-26.P2.el8
  • bind-pkcs11-libs-32:9.11.4-26.P2.el8
  • bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8
  • bind-pkcs11-utils-32:9.11.4-26.P2.el8
  • bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8
  • bind-sdb-32:9.11.4-26.P2.el8
  • bind-sdb-chroot-32:9.11.4-26.P2.el8
  • bind-sdb-debuginfo-32:9.11.4-26.P2.el8
  • bind-utils-32:9.11.4-26.P2.el8
  • bind-utils-debuginfo-32:9.11.4-26.P2.el8
  • python3-bind-32:9.11.4-26.P2.el8
  • bind-32:9.11.4-16.P2.el7
  • bind-chroot-32:9.11.4-16.P2.el7
  • bind-debuginfo-32:9.11.4-16.P2.el7
  • bind-devel-32:9.11.4-16.P2.el7
  • bind-export-devel-32:9.11.4-16.P2.el7
  • bind-export-libs-32:9.11.4-16.P2.el7
  • bind-libs-32:9.11.4-16.P2.el7
  • bind-libs-lite-32:9.11.4-16.P2.el7
  • bind-license-32:9.11.4-16.P2.el7
  • bind-lite-devel-32:9.11.4-16.P2.el7
  • bind-pkcs11-32:9.11.4-16.P2.el7
  • bind-pkcs11-devel-32:9.11.4-16.P2.el7
  • bind-pkcs11-libs-32:9.11.4-16.P2.el7
  • bind-pkcs11-utils-32:9.11.4-16.P2.el7
  • bind-sdb-32:9.11.4-16.P2.el7
  • bind-sdb-chroot-32:9.11.4-16.P2.el7
  • bind-utils-32:9.11.4-16.P2.el7