[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет bind9.16-dnssec-utils-32:9.16.23-0.22.el8_10.2.x86_64 download

Имя bind9.16-dnssec-utils
Эпоха 32
Версия 9.16.23
Релиз 0.22.el8_10.2
Архитектура x86_64
Сайт https://www.isc.org/downloads/bind/
Лицензия MPLv2.0
Время сборки 2025-02-20 09:08:39
Хост сборки builder-x86-04.inferitos.ru
Краткое описание DNSSEC keys and zones management utilities
Репозитории AppStream
Полное описание Bind-dnssec-utils contains a collection of utilities for editing DNSSEC keys and BIND zone files. These tools provide generation, revocation and verification of keys and DNSSEC signatures in zone files. You should install bind9.16-dnssec-utils if you need to sign a DNS zone or maintain keys for it.
Эррата INFSA-2025:1676
Размер 245 КиБ
Исходный проект bind9.16-9.16.23-0.22.el8_10.2
Контрольная сумма SHA-256 db2a3adf9f71e62331a30791e04196e52fb62e89d040afcb43e1e15a526e6a55
× Full screenshot
История изменений link
* Tue Feb 18 2025 Tomas Korbar <tkorbar@redhat.com> - 32:9.16.23-0.22.2
- Fix application of patch for CVE-2024-11187
- Resolves: RHEL-77103

* Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22.1
- Limit additional section records CPU processing (CVE-2024-11187)
- Fix test backport changes

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.22
- Minor fix of reclimit test backport (CVE-2024-1737)

* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.21
- Backport addition of max-records-per-type and max-records-per-type options
  (CVE-2024-1737)

* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.20
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

* Wed May 15 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.19
- Add few more explicit conflicts with bind subpackages (RHEL-2208)

* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.18
- Prevent crashing at masterformat system test (CVE-2023-6516)

* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.17
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-0.16
- Limit the amount of recursion possible in control channel (CVE-2023-3341)

* Tue Jul 25 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 32:9.16.23-0.15
- Rebuilt for MSVSphere 8.8