[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package bind9.16-32:9.16.23-0.22.el8_10.2.src download

Name bind9.16
Epoch 32
Version 9.16.23
Release 0.22.el8_10.2
Architecture src
Website/URL https://www.isc.org/downloads/bind/
License MPLv2.0
Build Time 2025-02-20 09:04:08
Build Host builder-x86-03.inferitos.ru
Summary The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
Repositories AppStream
Description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Errata
Size 5277 KiB
Source Project bind9.16-9.16.23-0.22.el8_10.2
SHA-256 checksum 77b2de245f5c8632351b7aee57675d661707384c91d82d85c600f8155a173daf
× Full screenshot
Changelog link
* Tue Feb 18 2025 Tomas Korbar <tkorbar@redhat.com> - 32:9.16.23-0.22.2
- Fix application of patch for CVE-2024-11187
- Resolves: RHEL-77103

* Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22.1
- Limit additional section records CPU processing (CVE-2024-11187)
- Fix test backport changes

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22
- Minor fix of reclimit test backport (CVE-2024-1737)

* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.21
- Backport addition of max-records-per-type and max-records-per-type options
  (CVE-2024-1737)

* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.20
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

* Wed May 15 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.19
- Add few more explicit conflicts with bind subpackages (RHEL-2208)

* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.18
- Prevent crashing at masterformat system test (CVE-2023-6516)

* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.17
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16
- Limit the amount of recursion possible in control channel (CVE-2023-3341)

* Tue Jul 25 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 32:9.16.23-0.15
- Rebuilt for MSVSphere 8.8