system environment/daemons

bind-pkcs11 - 암호화를 위한 BIND 내장 PKCS#11 기능

Website: http://www.isc.org/products/BIND/
License: MPLv2.0
Vendor: AnNyung Packaging Team
Description:
This is a version of BIND server built with native PKCS#11 functionality.
It is important to have SoftHSM v2+ installed and some token initialized.
For other supported HSM modules please check the BIND documentation.
This version of BIND binary is supported only in setup with the IPA server.

Packages

bind-pkcs11-9.11.4-26.P2.an3.15.x86_64 [366 KiB] Changelog by Stepan Broz (2023-09-25):
- Limit the amount of recursion possible in control channel (CVE-2023-3341)
bind-pkcs11-9.11.4-26.P2.an3.14.x86_64 [366 KiB] Changelog by Stepan Broz (2023-07-03):
- Prevent the cache going over the configured limit (CVE-2023-2828)
bind-pkcs11-9.11.4-26.P2.an3.13.x86_64 [365 KiB] Changelog by Petr Menšík (2022-12-14):
- Tighten cache protection against record from forwarders (CVE-2021-25220)
bind-pkcs11-9.11.4-26.P2.an3.9.x86_64 [365 KiB] Changelog by Petr Menšík (2022-01-24):
- Fix possible assertion failure isc_refcount_current == 0 in free_rbtdb
  (#1935152)
bind-pkcs11-9.11.4-26.P2.an3.8.x86_64 [365 KiB] Changelog by Petr Menšík (2021-10-14):
- Prevent a race after zone load (#2011220)
bind-pkcs11-9.11.4-26.P2.an3.7.x86_64 [365 KiB] Changelog by JoungKyun.Kim (2021-10-03):
- security issues
  . CVE-2021-25214 Insufficient IXFR checks could lead to assertion failure
bind-pkcs11-9.11.4-26.P2.an3.5.x86_64 [364 KiB] Changelog by Petr Menšík (2021-04-27):
- Possible assertion failure on DNAME processing (CVE-2021-25215)
bind-pkcs11-9.11.4-26.P2.an3.4.x86_64 [364 KiB] Changelog by Petr Menšík (2021-02-15):
- Fix off-by-one bug in ISC SPNEGO implementation (CVE-2020-8625)
bind-pkcs11-9.11.4-26.P2.an3.3.x86_64 [364 KiB] Changelog by Tomas Korbar (2020-11-06):
- Fix inline re-signing (#rh1889902)
bind-pkcs11-9.11.4-26.P2.an3.2.x86_64 [364 KiB] Changelog by Tomas Korbar (2020-10-02):
- Fix unsupported algorithms validation (#rh1769876)
- Fix tsig-request verify (CVE-2020-8622)
- Prevent PKCS11 daemon crash on crafted packet (CVE-2020-8623)
- Correct update-policy type subdomain to match documentation (CVE-2020-8624)
bind-pkcs11-9.11.4-16.P2.an3.6.x86_64 [363 KiB] Changelog by JoungKyun.Kim (2020-06-16):
- update 9.11.4.16.6 of RHEL 7.8
- security issues
  . CVE-2020-8616 Limit number of queries triggered by a request
  . CVE-2020-8617 Fix invalid tsig request
bind-pkcs11-9.11.4-16.P2.an3.2.x86_64 [362 KiB] Changelog by JoungKyun.Kim (2020-04-07):
- update 9.11.4-16 of RHEL 7.8
- security issues
  . CVE-2018-5745
  . CVE-2019-6465
bind-pkcs11-9.11.4-9.P2.an3.x86_64 [361 KiB] Changelog by JoungKyun.Kim (2019-09-28):
- update 9.11.4 of RHEL 7.7
- security issues
  . CVE-2019-6471
  . CVE-2018-5743
- GeoDNS functionality changed from google to isc.
  . see also https://kb.isc.org/docs/aa-01149
bind-pkcs11-9.9.4-74.an3.2.x86_64 [231 KiB] Changelog by Petr Menšík (2019-06-21):
- Fix unstable zone transfers (#1724071)
- Understand keep-response-order for backward compatibility
bind-pkcs11-9.9.4-74.an3.1.x86_64 [232 KiB] Changelog by JoungKyun.Kim (2019-06-11):
- security issues
  . CVE-2018-5743
  . CVE-2018-5743
bind-pkcs11-9.9.4-73.an3.x86_64 [230 KiB] Changelog by Petr Menšík (2018-11-23):
- Fixes debug level comments (#1647539)
bind-pkcs11-9.9.4-72.an3.x86_64 [230 KiB] Changelog by Petr Menšík (2018-09-20):
- Fix automatic selinux boolean named_write_master_zones (#1569466)
- Allow starting named with readonly home again
bind-pkcs11-9.9.4-61.an3.1.x86_64 [227 KiB] Changelog by Petr Menšík (2018-08-09):
- Fix CVE-2018-5740
bind-pkcs11-9.9.4-61.an3.x86_64 [227 KiB] Changelog by Petr Menšík (2018-01-16):
- Fix CVE-2017-3145
bind-pkcs11-9.9.4-51.an3.2.x86_64 [226 KiB] Changelog by Petr Menšík (2018-01-17):
- Fix CVE-2017-3145
bind-pkcs11-9.9.4-51.an3.x86_64 [225 KiB] Changelog by JoungKyun.Kim (2017-08-12):
- fixed wrong log rotate
- compress rotated log
bind-pkcs11-9.9.4-50.an3.1.x86_64 [225 KiB] Changelog by Petr Menšík (2017-06-30):
- Bump again above RHEL-7.4
- Fix CVE-2017-3142 and CVE-2017-3143
bind-pkcs11-9.9.4-38.an3.3.x86_64 [224 KiB] Changelog by Petr Menšík (2017-04-12):
- Fix CVE-2017-3136 (ISC change 4575)
- Fix CVE-2017-3137 (ISC change 4578)
bind-pkcs11-9.9.4-38.an3.2.x86_64 [224 KiB] Changelog by Petr Menšík (2017-02-08):
- Fix CVE-2017-3135 (ISC change 4557)
- Fix and test caching CNAME before DNAME (ISC change 4558)
bind-pkcs11-9.9.4-38.an3.1.x86_64 [225 KiB] Changelog by Petr Menšík (2017-01-09):
- Fix CVE-2016-9131 (ISC change 4508)
- Fix CVE-2016-9147 (ISC change 4510)
- Fix regression introduced by CVE-2016-8864 (ISC change 4530)
- Fix CVE-2016-9444 (ISC change 4517)
bind-pkcs11-9.9.4-38.an3.x86_64 [224 KiB] Changelog by JoungKyun.Kim (2016-12-14):
- Added automatic interface scan functionality (#1294506)
- Removed NetworkManager dispatcher script since it is not needed any more (#1294506)
- Added support for CAA records (#1306610)
- Fix excessive queries caused by DS chasing with stub zones when DNSSEC is not used (#1291185)
- replace geoip patch to
- for AnNyung's changes
  Do not use RHEL's geoip patch for backwards compatibility, but keep the old geodns patch
  set GEOIP_DATA_COPY="yes" in /etc/sysconfig/named
  Usage: https://code.google.com/p/bind-geoip/wiki/UsageGuide
bind-pkcs11-9.9.4-29.an3.5.x86_64 [223 KiB] Changelog by Tomas Hozza (2016-10-31):
- Fix CVE-2016-8864
bind-pkcs11-9.9.4-29.an3.4.x86_64 [222 KiB] Changelog by Tomas Hozza (2016-09-23):
- Fix CVE-2016-2776
bind-pkcs11-9.9.4-29.an3.3.x86_64 [222 KiB] Changelog by Tomas Hozza (2016-03-08):
- Fix CVE-2016-1285 and CVE-2016-1286
bind-pkcs11-9.9.4-29.an3.2.x86_64 [721 KiB] Changelog by Tomas Hozza (2016-01-18):
- Fix CVE-2015-8704
bind-pkcs11-9.9.4-29.an3.1.x86_64 [721 KiB] Changelog by Tomas Hozza (2015-12-14):
- fixed security isseus
  . CVE-2015-8000
    A denial of service flaw was found in the way BIND processed certain
    records with malformed class attributes. A remote attacker could use this
    flaw to send a query to request a cached record with a malformed class
    attribute that would cause named functioning as an authoritative or
    recursive server to crash.
bind-pkcs11-9.9.4-29.an3.x86_64 [721 KiB] Changelog by JoungKyun.Kim (2015-09-02):
- remove chroot package (default chroot mode)
- add geodns patch
  set GEOIP_DATA_COPY="yes" in /etc/sysconfig/named
  https://code.google.com/p/bind-geoip/wiki/UsageGuide

Listing created by Repoview-0.6.6-4.el7