Пакет unbound-libs-1.16.2-5.9.el8_10.x86_64
Имя | unbound-libs |
---|---|
Эпоха | 0 |
Версия | 1.16.2 |
Релиз | 5.9.el8_10 |
Архитектура | x86_64 |
Сайт | https://www.unbound.net/ |
Лицензия | BSD |
Время сборки | 2025-07-29 09:05:06 |
Хост сборки | builder-x86-03.inferitos.ru |
Краткое описание | Libraries used by the unbound server and client applications |
Репозитории | AppStream |
Полное описание | Contains libraries used by the unbound server and client applications |
Эррата | INFSA-2025:11884 |
Размер | 578 КиБ |
Исходный проект | unbound-1.16.2-5.9.el8_10 |
Контрольная сумма SHA-256 | 7a84df3736c8b3d90074bcd8f2974093dbf4bbe94b422b5ab0a5620bc18e1997 |
×
* Thu Jul 24 2025 Tomas Korbar <tkorbar@redhat.com> - 1.16.2-5.9 - Fix RebirthDay Attack (CVE-2025-5994) - Resolves: RHEL-104123 * Tue Nov 12 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-5.8 - Prevent unbounded name compression (CVE-2024-8508) * Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-5.7 - Rebuild to propagate to CentOS Stream (RHEL-25500) * Mon Mar 11 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-5.6 - Ensure group access correction reaches also updated configs (CVE-2024-1488) * Wed Feb 28 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-5.3 - Ensure only unbound group can change configuration (CVE-2024-1488) * Fri Feb 16 2024 Tomas Korbar <tkorbar@redhat.com> - 1.16.2-5.1 - Fix KeyTrap - Extreme CPU consumption in DNSSEC validator CVE-2023-50387 - Fix Preparing an NSEC3 closest encloser proof can exhaust CPU resources CVE-2023-50868 - Resolves: RHEL-25428 - Resolves: RHEL-25423 * Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1.16.2-5 - Rebuilt for MSVSphere 8.8 * Sat Oct 15 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-5 - Stop creating wrong devel manual pages (#2135322) * Sat Oct 15 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-4 - Apply correctly previous change (CVE-2022-3204) * Tue Oct 11 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-3 - Fix NRDelegation attack leading to uncontrolled resource consumption (CVE-2022-3204)