Пакет bind9.16-32:9.16.23-0.22.el8_10.2.x86_64
Имя | bind9.16 |
---|---|
Эпоха | 32 |
Версия | 9.16.23 |
Релиз | 0.22.el8_10.2 |
Архитектура | x86_64 |
Сайт | https://www.isc.org/downloads/bind/ |
Лицензия | MPLv2.0 |
Время сборки | 2025-02-20 09:08:39 |
Хост сборки | builder-x86-04.inferitos.ru |
Краткое описание | The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server |
Репозитории | AppStream |
Полное описание | BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. |
Эррата | INFSA-2025:1676 |
Размер | 606 КиБ |
Исходный проект | bind9.16-9.16.23-0.22.el8_10.2 |
Контрольная сумма SHA-256 | 8dd83f86e02743a88638e357d217aab0a4aa2ddd33da53a8c910ccf68d6ada25 |
×
* Tue Feb 18 2025 Tomas Korbar <tkorbar@redhat.com> - 32:9.16.23-0.22.2 - Fix application of patch for CVE-2024-11187 - Resolves: RHEL-77103 * Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22.1 - Limit additional section records CPU processing (CVE-2024-11187) - Fix test backport changes * Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22 - Minor fix of reclimit test backport (CVE-2024-1737) * Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.21 - Backport addition of max-records-per-type and max-records-per-type options (CVE-2024-1737) * Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.20 - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name * Wed May 15 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.19 - Add few more explicit conflicts with bind subpackages (RHEL-2208) * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.18 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.17 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Tue Jul 25 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 32:9.16.23-0.15 - Rebuilt for MSVSphere 8.8