Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bind-9.16.23-24.el9_5 RPM for s390x

From AlmaLinux 9.5 AppStream for s390x

Name: bind Distribution: AlmaLinux
Version: 9.16.23 Vendor: AlmaLinux
Release: 24.el9_5 Build date: Thu Oct 3 07:58:04 2024
Group: Unspecified Build host: s390x-builder02.almalinux.org
Size: 1481090 Source RPM: bind-9.16.23-24.el9_5.src.rpm
Packager: AlmaLinux Packaging Team <packager@almalinux.org>
Url: https://www.isc.org/downloads/bind/
Summary: The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named),
which resolves host names to IP addresses; a resolver library
(routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating properly.

Provides

Requires

License

MPLv2.0

Changelog

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24
  - Minor fix of reclimit test backport (CVE-2024-1737)
* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23
  - Backport addition of max-records-per-type and max-records-per-type options
* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22
  - Resolve CVE-2024-1975
  - Resolve CVE-2024-1737
  - Resolve CVE-2024-4076
  - Add ability to change runtime limits for max types and records per name
* Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21
  - Increase size of hazard pointer array (RHEL-39131)
* Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20
  - Ensure bind CVE fixes hits public Stream repository
* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19
  - Ensure incompatible bind-dyndb-ldap is not accepted
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
  - Prevent crashing at masterformat system test (CVE-2023-6516)
* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
  - Import tests for large DNS messages fix
  - Add downstream change complementing CVE-2023-50387
* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
  - Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  - Prevent assertion failure when nxdomain-redirect is used with
   RFC 1918 reverse zones (CVE-2023-5517)
  - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  - Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)
* Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15
  - Update addresses of b.root-servers.net (RHEL-18188)
* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14
  - Limit the amount of recursion possible in control channel (CVE-2023-3341)
* Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13
  - Prevent possible endless loop when refreshing stale data (CVE-2023-2911)
* Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12
  - Strengten cache cleaning to prevent overflowing configured limit
    (CVE-2023-2828)
* Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11
  - Correct backport issue in statistics rendering fix (#2126912)
* Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10
  - Handle subtle difference between upstream and rhel (CVE-2022-3094)
* Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9
  - Prevent flooding with UPDATE requests (CVE-2022-3094)
  - Handle RRSIG queries when server-stale is active (CVE-2022-3736)
  - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924)
* Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8
  - Correct regression preventing bind-dyndb-ldap build (#2162795)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7
  - Prevent freeing zone during statistics rendering (#2101712)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6
  - Bound the amount of work performed for delegations (CVE-2022-2795)
  - Add /usr/lib64/named to bind-chroot (#2129466)
* Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5
  - Fix possible serve-stale related crash (CVE-2022-3080)
  - Fix memory leak in ECDSA verify processing (CVE-2022-38177)
  - Fix memory leak in EdDSA verify processing (CVE-2022-38178)

Files

/etc/logrotate.d/named
/etc/named
/etc/named.conf
/etc/named.rfc1912.zones
/etc/named.root.key
/etc/rndc.conf
/etc/rndc.key
/etc/rwtab.d/named
/etc/sysconfig/named
/run/named
/usr/bin/mdig
/usr/bin/named-rrchecker
/usr/lib/.build-id
/usr/lib/.build-id/01
/usr/lib/.build-id/01/95e7748ce0e405c1a9f9a9ad3afadc5dc103fe
/usr/lib/.build-id/19
/usr/lib/.build-id/19/f5da6573c0dd698e2752f1512a9b9583a087fa
/usr/lib/.build-id/5d
/usr/lib/.build-id/5d/b5d86d0ddf4f833c6ff79673b0e3f867a0c329
/usr/lib/.build-id/84
/usr/lib/.build-id/84/126fbfd51eb320afb6dfcc58129522dbf6a150
/usr/lib/.build-id/93
/usr/lib/.build-id/93/026c10f1b33d0b7e0fc03475e8f6d66f714ab7
/usr/lib/.build-id/b4
/usr/lib/.build-id/b4/b2b99fd323edb860e0bf9777da0b0a2bbbc950
/usr/lib/.build-id/c1
/usr/lib/.build-id/c1/859678b302016ab65fb44f7c0642959de690b0
/usr/lib/.build-id/d9
/usr/lib/.build-id/d9/8eb3208668b29b25387df4fba0405c86f93d61
/usr/lib/systemd/system/named-setup-rndc.service
/usr/lib/systemd/system/named.service
/usr/lib/tmpfiles.d/named.conf
/usr/lib64/bind
/usr/lib64/named
/usr/lib64/named/filter-aaaa.so
/usr/libexec/generate-rndc-key.sh
/usr/sbin/named
/usr/sbin/named-checkconf
/usr/sbin/named-journalprint
/usr/sbin/rndc
/usr/sbin/rndc-confgen
/usr/share/doc/bind
/usr/share/doc/bind/CHANGES
/usr/share/doc/bind/README
/usr/share/doc/bind/named.conf.default
/usr/share/doc/bind/sample
/usr/share/doc/bind/sample/etc
/usr/share/doc/bind/sample/etc/named.conf
/usr/share/doc/bind/sample/etc/named.rfc1912.zones
/usr/share/doc/bind/sample/var
/usr/share/doc/bind/sample/var/named
/usr/share/doc/bind/sample/var/named/data
/usr/share/doc/bind/sample/var/named/my.external.zone.db
/usr/share/doc/bind/sample/var/named/my.internal.zone.db
/usr/share/doc/bind/sample/var/named/named.ca
/usr/share/doc/bind/sample/var/named/named.empty
/usr/share/doc/bind/sample/var/named/named.localhost
/usr/share/doc/bind/sample/var/named/named.loopback
/usr/share/doc/bind/sample/var/named/slaves
/usr/share/doc/bind/sample/var/named/slaves/my.ddns.internal.zone.db
/usr/share/doc/bind/sample/var/named/slaves/my.slave.internal.zone.db
/usr/share/man/man1/mdig.1.gz
/usr/share/man/man1/named-rrchecker.1.gz
/usr/share/man/man5/named.conf.5.gz
/usr/share/man/man5/rndc.conf.5.gz
/usr/share/man/man8/filter-aaaa.8.gz
/usr/share/man/man8/named-checkconf.8.gz
/usr/share/man/man8/named-journalprint.8.gz
/usr/share/man/man8/named.8.gz
/usr/share/man/man8/rndc-confgen.8.gz
/usr/share/man/man8/rndc.8.gz
/var/log/named.log
/var/named
/var/named/data
/var/named/dynamic
/var/named/named.ca
/var/named/named.empty
/var/named/named.localhost
/var/named/named.loopback
/var/named/slaves


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Nov 15 09:08:44 2024