system environment/daemons

bind-pkcs11 - 암호화를 위한 BIND 내장 PKCS#11 기능

Website: http://www.isc.org/products/BIND/
License: ISC
Vendor: AnNyung Packaging Team
Description:
This is a version of BIND server built with native PKCS#11 functionality.
It is important to have SoftHSM v2+ installed and some token initialized.
For other supported HSM modules please check the BIND documentation.
This version of BIND binary is supported only in setup with the IPA server.

Packages

bind-pkcs11-9.9.4-73.an3.x86_64 [230 KiB] Changelog by Petr Menšík (2018-11-23):
- Fixes debug level comments (#1647539)
bind-pkcs11-9.9.4-72.an3.x86_64 [230 KiB] Changelog by Petr Menšík (2018-09-20):
- Fix automatic selinux boolean named_write_master_zones (#1569466)
- Allow starting named with readonly home again
bind-pkcs11-9.9.4-61.an3.1.x86_64 [227 KiB] Changelog by Petr Menšík (2018-08-09):
- Fix CVE-2018-5740
bind-pkcs11-9.9.4-61.an3.x86_64 [227 KiB] Changelog by Petr Menšík (2018-01-16):
- Fix CVE-2017-3145
bind-pkcs11-9.9.4-51.an3.2.x86_64 [226 KiB] Changelog by Petr Menšík (2018-01-17):
- Fix CVE-2017-3145
bind-pkcs11-9.9.4-51.an3.x86_64 [225 KiB] Changelog by JoungKyun.Kim (2017-08-12):
- fixed wrong log rotate
- compress rotated log
bind-pkcs11-9.9.4-50.an3.1.x86_64 [225 KiB] Changelog by Petr Menšík (2017-06-30):
- Bump again above RHEL-7.4
- Fix CVE-2017-3142 and CVE-2017-3143
bind-pkcs11-9.9.4-38.an3.3.x86_64 [224 KiB] Changelog by Petr Menšík (2017-04-12):
- Fix CVE-2017-3136 (ISC change 4575)
- Fix CVE-2017-3137 (ISC change 4578)
bind-pkcs11-9.9.4-38.an3.2.x86_64 [224 KiB] Changelog by Petr Menšík (2017-02-08):
- Fix CVE-2017-3135 (ISC change 4557)
- Fix and test caching CNAME before DNAME (ISC change 4558)
bind-pkcs11-9.9.4-38.an3.1.x86_64 [225 KiB] Changelog by Petr Menšík (2017-01-09):
- Fix CVE-2016-9131 (ISC change 4508)
- Fix CVE-2016-9147 (ISC change 4510)
- Fix regression introduced by CVE-2016-8864 (ISC change 4530)
- Fix CVE-2016-9444 (ISC change 4517)
bind-pkcs11-9.9.4-38.an3.x86_64 [224 KiB] Changelog by JoungKyun.Kim (2016-12-14):
- Added automatic interface scan functionality (#1294506)
- Removed NetworkManager dispatcher script since it is not needed any more (#1294506)
- Added support for CAA records (#1306610)
- Fix excessive queries caused by DS chasing with stub zones when DNSSEC is not used (#1291185)
- replace geoip patch to
- for AnNyung's changes
  Do not use RHEL's geoip patch for backwards compatibility, but keep the old geodns patch
  set GEOIP_DATA_COPY="yes" in /etc/sysconfig/named
  Usage: https://code.google.com/p/bind-geoip/wiki/UsageGuide
bind-pkcs11-9.9.4-29.an3.5.x86_64 [223 KiB] Changelog by Tomas Hozza (2016-10-31):
- Fix CVE-2016-8864
bind-pkcs11-9.9.4-29.an3.4.x86_64 [222 KiB] Changelog by Tomas Hozza (2016-09-23):
- Fix CVE-2016-2776
bind-pkcs11-9.9.4-29.an3.3.x86_64 [222 KiB] Changelog by Tomas Hozza (2016-03-08):
- Fix CVE-2016-1285 and CVE-2016-1286
bind-pkcs11-9.9.4-29.an3.2.x86_64 [721 KiB] Changelog by Tomas Hozza (2016-01-18):
- Fix CVE-2015-8704
bind-pkcs11-9.9.4-29.an3.1.x86_64 [721 KiB] Changelog by Tomas Hozza (2015-12-14):
- fixed security isseus
  . CVE-2015-8000
    A denial of service flaw was found in the way BIND processed certain
    records with malformed class attributes. A remote attacker could use this
    flaw to send a query to request a cached record with a malformed class
    attribute that would cause named functioning as an authoritative or
    recursive server to crash.
bind-pkcs11-9.9.4-29.an3.x86_64 [721 KiB] Changelog by JoungKyun.Kim (2015-09-02):
- remove chroot package (default chroot mode)
- add geodns patch
  set GEOIP_DATA_COPY="yes" in /etc/sysconfig/named
  https://code.google.com/p/bind-geoip/wiki/UsageGuide

Listing created by Repoview-0.6.6-4.el7