Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bind-utils | Distribution: AlmaLinux |
Version: 9.16.23 | Vendor: AlmaLinux |
Release: 18.el9_4.6 | Build date: Mon Aug 12 17:51:18 2024 |
Group: Unspecified | Build host: arm-builder01.almalinux.org |
Size: 992422 | Source RPM: bind-9.16.23-18.el9_4.6.src.rpm |
Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
Url: https://www.isc.org/downloads/bind/ | |
Summary: Utilities for querying DNS name servers |
Bind-utils contains a collection of utilities for querying DNS (Domain Name System) name servers to find out information about Internet hosts. These tools will provide you with the IP addresses for given host names, as well as other information about registered domains and network addresses. You should install bind-utils if you need to get information from DNS name servers.
MPLv2.0
* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.6 - Minor fix of reclimit test backport (CVE-2024-1737) * Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.5 - Backport addition of max-records-per-type and max-records-per-type options * Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.2 - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.1 - Rebuild with correct z-stream tag again * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17 - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) * Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15 - Update addresses of b.root-servers.net (RHEL-18188) * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13 - Prevent possible endless loop when refreshing stale data (CVE-2023-2911) * Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12 - Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828) * Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11 - Correct backport issue in statistics rendering fix (#2126912) * Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10 - Handle subtle difference between upstream and rhel (CVE-2022-3094) * Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9 - Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924) * Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8 - Correct regression preventing bind-dyndb-ldap build (#2162795) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7 - Prevent freeing zone during statistics rendering (#2101712) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6 - Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466) * Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5 - Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)
/etc/trusted-key.key /usr/bin/arpaname /usr/bin/delv /usr/bin/dig /usr/bin/dnstap-read /usr/bin/host /usr/bin/nslookup /usr/bin/nsupdate /usr/lib/.build-id /usr/lib/.build-id/09 /usr/lib/.build-id/09/af207481aa2f1beae576e3c479b6ec6315205d /usr/lib/.build-id/12 /usr/lib/.build-id/12/9c33be54ed5302fb575fd37c29a78f38ab730e /usr/lib/.build-id/5d /usr/lib/.build-id/5d/2a8240293258b6c795e7123d0447e344d4df21 /usr/lib/.build-id/7c /usr/lib/.build-id/7c/aa7144c0d6a57d047206388ab8996adace1bc6 /usr/lib/.build-id/8e /usr/lib/.build-id/8e/864b69a278d773be61c221356a4cbcebbf1fba /usr/lib/.build-id/a1 /usr/lib/.build-id/a1/c3d40b5691f9b4ea1e83920257396625c51a55 /usr/lib/.build-id/cf /usr/lib/.build-id/cf/819543a1c74e016c19b9688c6008b913b5d3b9 /usr/lib/.build-id/d0 /usr/lib/.build-id/d0/5c94a82c2c3966e18d072900b9b153ebcef8af /usr/lib/.build-id/d1 /usr/lib/.build-id/d1/21c80fe2cf64592ddc3b72d7284c59bd73ea87 /usr/lib/.build-id/d4 /usr/lib/.build-id/d4/a3a4f39301f6a8c8bf55f537a4a4a0756efba9 /usr/lib/.build-id/de /usr/lib/.build-id/de/d624cf8eef3f593a54613f7c626efb24a4b70d /usr/sbin/ddns-confgen /usr/sbin/named-checkzone /usr/sbin/named-compilezone /usr/sbin/named-nzd2nzf /usr/sbin/nsec3hash /usr/sbin/tsig-keygen /usr/share/man/man1/arpaname.1.gz /usr/share/man/man1/delv.1.gz /usr/share/man/man1/dig.1.gz /usr/share/man/man1/dnstap-read.1.gz /usr/share/man/man1/host.1.gz /usr/share/man/man1/nslookup.1.gz /usr/share/man/man1/nsupdate.1.gz /usr/share/man/man8/ddns-confgen.8.gz /usr/share/man/man8/named-checkzone.8.gz /usr/share/man/man8/named-compilezone.8.gz /usr/share/man/man8/named-nzd2nzf.8.gz /usr/share/man/man8/nsec3hash.8.gz /usr/share/man/man8/tsig-keygen.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Nov 12 07:34:42 2024