Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bind-libs | Distribution: AlmaLinux |
Version: 9.16.23 | Vendor: AlmaLinux |
Release: 24.el9_5 | Build date: Thu Oct 3 07:58:04 2024 |
Group: Unspecified | Build host: s390x-builder02.almalinux.org |
Size: 3590868 | Source RPM: bind-9.16.23-24.el9_5.src.rpm |
Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
Url: https://www.isc.org/downloads/bind/ | |
Summary: Libraries used by the BIND DNS packages |
Contains heavyweight version of BIND suite libraries used by both named DNS server and utilities in bind-utils package.
MPLv2.0
* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24 - Minor fix of reclimit test backport (CVE-2024-1737) * Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23 - Backport addition of max-records-per-type and max-records-per-type options * Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22 - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name * Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21 - Increase size of hazard pointer array (RHEL-39131) * Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20 - Ensure bind CVE fixes hits public Stream repository * Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19 - Ensure incompatible bind-dyndb-ldap is not accepted * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17 - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) * Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15 - Update addresses of b.root-servers.net (RHEL-18188) * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13 - Prevent possible endless loop when refreshing stale data (CVE-2023-2911) * Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12 - Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828) * Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11 - Correct backport issue in statistics rendering fix (#2126912) * Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10 - Handle subtle difference between upstream and rhel (CVE-2022-3094) * Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9 - Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924) * Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8 - Correct regression preventing bind-dyndb-ldap build (#2162795) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7 - Prevent freeing zone during statistics rendering (#2101712) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6 - Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466) * Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5 - Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)
/usr/lib/.build-id /usr/lib/.build-id/1c /usr/lib/.build-id/1c/8605de95aed1c3102ab7be1ae19d0c477f926d /usr/lib/.build-id/31 /usr/lib/.build-id/31/a2f9e0726638e74a4aa6b56bc81ac9ec20cc06 /usr/lib/.build-id/48 /usr/lib/.build-id/48/93345992dd9a63b845229b7a73f2b5a9242db2 /usr/lib/.build-id/9a /usr/lib/.build-id/9a/eed92fadaf4e2bb5b230679da2ccbc98fec168 /usr/lib/.build-id/a0 /usr/lib/.build-id/a0/6fe5100e753737a5b3dedf5654d4184968c10b /usr/lib/.build-id/b0 /usr/lib/.build-id/b0/7e7673d7638d42be85a2490a7875ba1ac1f494 /usr/lib/.build-id/bf /usr/lib/.build-id/bf/fd140a8e8b75e50ad44ae8feac3e05e1feeda0 /usr/lib64/libbind9-9.16.23-RH.so /usr/lib64/libdns-9.16.23-RH.so /usr/lib64/libirs-9.16.23-RH.so /usr/lib64/libisc-9.16.23-RH.so /usr/lib64/libisccc-9.16.23-RH.so /usr/lib64/libisccfg-9.16.23-RH.so /usr/lib64/libns-9.16.23-RH.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Nov 15 09:08:44 2024