Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bind-libs | Distribution: AlmaLinux |
Version: 9.16.23 | Vendor: AlmaLinux |
Release: 24.el9_5 | Build date: Thu Oct 3 07:22:18 2024 |
Group: Unspecified | Build host: x64-builder02.almalinux.org |
Size: 3663900 | Source RPM: bind-9.16.23-24.el9_5.src.rpm |
Packager: AlmaLinux Packaging Team <packager@almalinux.org> | |
Url: https://www.isc.org/downloads/bind/ | |
Summary: Libraries used by the BIND DNS packages |
Contains heavyweight version of BIND suite libraries used by both named DNS server and utilities in bind-utils package.
MPLv2.0
* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24 - Minor fix of reclimit test backport (CVE-2024-1737) * Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23 - Backport addition of max-records-per-type and max-records-per-type options * Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22 - Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name * Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21 - Increase size of hazard pointer array (RHEL-39131) * Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20 - Ensure bind CVE fixes hits public Stream repository * Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19 - Ensure incompatible bind-dyndb-ldap is not accepted * Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18 - Prevent crashing at masterformat system test (CVE-2023-6516) * Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17 - Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387 * Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16 - Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) * Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15 - Update addresses of b.root-servers.net (RHEL-18188) * Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14 - Limit the amount of recursion possible in control channel (CVE-2023-3341) * Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13 - Prevent possible endless loop when refreshing stale data (CVE-2023-2911) * Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12 - Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828) * Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11 - Correct backport issue in statistics rendering fix (#2126912) * Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10 - Handle subtle difference between upstream and rhel (CVE-2022-3094) * Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9 - Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924) * Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8 - Correct regression preventing bind-dyndb-ldap build (#2162795) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7 - Prevent freeing zone during statistics rendering (#2101712) * Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6 - Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466) * Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5 - Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)
/usr/lib/.build-id /usr/lib/.build-id/2d /usr/lib/.build-id/2d/4c311a2da89370b17e714803fce1e6cc9111e8 /usr/lib/.build-id/2d/6177fc4c06f1ef640bb35a57da9ef3fd980ac7 /usr/lib/.build-id/33 /usr/lib/.build-id/33/278272d928a96d03fa165d13381971b9eb7aaa /usr/lib/.build-id/37 /usr/lib/.build-id/37/4be6ecbbbda33fc378450b26df68ad497b65de /usr/lib/.build-id/59 /usr/lib/.build-id/59/9f2b21c78a92acc3137c151ac10efc209dc1c2 /usr/lib/.build-id/83 /usr/lib/.build-id/83/12d0bc71b54f71857dd5c484c1a5f5e2c74866 /usr/lib/.build-id/fb /usr/lib/.build-id/fb/f2019267f0e31ecb324b97e90e2ab4e7b31535 /usr/lib64/libbind9-9.16.23-RH.so /usr/lib64/libdns-9.16.23-RH.so /usr/lib64/libirs-9.16.23-RH.so /usr/lib64/libisc-9.16.23-RH.so /usr/lib64/libisccc-9.16.23-RH.so /usr/lib64/libisccfg-9.16.23-RH.so /usr/lib64/libns-9.16.23-RH.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Nov 15 09:00:43 2024