[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package bind9.16-32:9.16.23-0.22.el8_10.2.x86_64 download

Name bind9.16
Epoch 32
Version 9.16.23
Release 0.22.el8_10.2
Architecture x86_64
Website/URL https://www.isc.org/downloads/bind/
License MPLv2.0
Build Time 2025-02-20 09:08:39
Build Host builder-x86-04.inferitos.ru
Summary The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
Repositories AppStream
Description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Errata INFSA-2025:1676
Size 606 KiB
Source Project bind9.16-9.16.23-0.22.el8_10.2
SHA-256 checksum 8dd83f86e02743a88638e357d217aab0a4aa2ddd33da53a8c910ccf68d6ada25
× Full screenshot
Changelog link
* Tue Feb 18 2025 Tomas Korbar <tkorbar@redhat.com> - 32:9.16.23-0.22.2
- Fix application of patch for CVE-2024-11187
- Resolves: RHEL-77103

* Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22.1
- Limit additional section records CPU processing (CVE-2024-11187)
- Fix test backport changes

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22
- Minor fix of reclimit test backport (CVE-2024-1737)

* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.21
- Backport addition of max-records-per-type and max-records-per-type options
  (CVE-2024-1737)

* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.20
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

* Wed May 15 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.19
- Add few more explicit conflicts with bind subpackages (RHEL-2208)

* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.18
- Prevent crashing at masterformat system test (CVE-2023-6516)

* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.17
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16
- Limit the amount of recursion possible in control channel (CVE-2023-3341)

* Tue Jul 25 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 32:9.16.23-0.15
- Rebuilt for MSVSphere 8.8