Пакет bind9.16-32:9.16.23-0.16.el8_9.2.src
Имя | bind9.16 |
---|---|
Эпоха | 32 |
Версия | 9.16.23 |
Релиз | 0.16.el8_9.2 |
Архитектура | src |
Сайт | https://www.isc.org/downloads/bind/ |
Лицензия | MPLv2.0 |
Время сборки | 2024-04-12 13:28:57 |
Хост сборки | builder-x86-06.inferitos.ru |
Краткое описание | The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server |
Репозитории | AppStream |
Полное описание | BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. |
Эррата | — |
Размер | 5213 КиБ |
Исходный проект | bind9.16-9.16.23-0.16.el8_9.2 |
Контрольная сумма SHA-256 | 5b97417096dd6e0c781fdcb64b6600512e57e6c918953a2e4967c929633eb5aa |
×
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16.2 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16.1 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Tue Jul 25 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 32:9.16.23-0.15 - Rebuilt for MSVSphere 8.8 * Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.15 - Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828) * Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.14 - Handle subtle difference between upstream and rhel (CVE-2022-3094) * Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.13 - Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924) * Tue Dec 20 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.12 - Include bind9.16-dnssec-utils in public repository (#2115322) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.11 - Bound the amount of work performed for delegations (CVE-2022-2795) * Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.10 - Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)