Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bind-chroot | Distribution: AlmaLinux |
Version: 9.16.23 | Vendor: AlmaLinux |
Release: 24.el9_5 | Build date: Thu Oct 3 07:58:04 2024 |
Group: Unspecified | Build host: s390x-builder02.almalinux.org |
Size: 4812 | Source RPM: bind-9.16.23-24.el9_5.src.rpm |
Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
Url: https://www.isc.org/downloads/bind/ | |
Summary: A chroot runtime environment for the ISC BIND DNS server, named(8) |
This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak <kas@fi.muni.cz>
MPLv2.0
* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24 - Minor fix of reclimit test backport (CVE-2024-1737) * Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23 - Backport addition of max-records-per-type and max-records-per-type options * Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22 - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name * Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21 - Increase size of hazard pointer array (RHEL-39131) * Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20 - Ensure bind CVE fixes hits public Stream repository * Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19 - Ensure incompatible bind-dyndb-ldap is not accepted * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17 - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) * Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15 - Update addresses of b.root-servers.net (RHEL-18188) * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13 - Prevent possible endless loop when refreshing stale data (CVE-2023-2911) * Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12 - Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828) * Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11 - Correct backport issue in statistics rendering fix (#2126912) * Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10 - Handle subtle difference between upstream and rhel (CVE-2022-3094) * Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9 - Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924) * Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8 - Correct regression preventing bind-dyndb-ldap build (#2162795) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7 - Prevent freeing zone during statistics rendering (#2101712) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6 - Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466) * Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5 - Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)
/etc/named-chroot.files /usr/lib/systemd/system/named-chroot-setup.service /usr/lib/systemd/system/named-chroot.service /usr/libexec/setup-named-chroot.sh /var/named/chroot /var/named/chroot/dev /var/named/chroot/dev/null /var/named/chroot/dev/random /var/named/chroot/dev/urandom /var/named/chroot/dev/zero /var/named/chroot/etc /var/named/chroot/etc/crypto-policies /var/named/chroot/etc/crypto-policies/back-ends /var/named/chroot/etc/named /var/named/chroot/etc/named.conf /var/named/chroot/etc/pki /var/named/chroot/etc/pki/dnssec-keys /var/named/chroot/proc /var/named/chroot/proc/sys /var/named/chroot/proc/sys/net /var/named/chroot/proc/sys/net/ipv4 /var/named/chroot/run /var/named/chroot/run/named /var/named/chroot/usr /var/named/chroot/usr/lib64 /var/named/chroot/usr/lib64/bind /var/named/chroot/usr/lib64/named /var/named/chroot/usr/share/GeoIP /var/named/chroot/var /var/named/chroot/var/log /var/named/chroot/var/named /var/named/chroot/var/run /var/named/chroot/var/tmp
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Nov 15 09:08:44 2024