[ Все A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет bind-32:9.16.23-24.el9_5.x86_64 download

Имя bind
Эпоха 32
Версия 9.16.23
Релиз 24.el9_5
Архитектура x86_64
Сайт https://www.isc.org/downloads/bind/
Лицензия MPLv2.0
Время сборки 2025-02-20 16:13:22
Хост сборки certified-builder01.msvsphere-os.ru
Краткое описание The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
Репозитории OS
Полное описание BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Эррата
Размер 501 КиБ
Исходный проект bind-9.16.23-24.el9_5
Контрольная сумма SHA-256 238d798a099c189bfcdf5d3130911f28e29010c17e19bb129b04ec5cce1f16de
× Full screenshot
История изменений link
* Wed Oct 16 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 9.16.23-24
- Rebuilt for MSVSphere 9.5

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24
- Minor fix of reclimit test backport (CVE-2024-1737)

* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23
- Backport addition of max-records-per-type and max-records-per-type options

* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

* Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21
- Increase size of hazard pointer array (RHEL-39131)

* Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20
- Ensure bind CVE fixes hits public Stream repository

* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19
- Ensure incompatible bind-dyndb-ldap is not accepted

* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
- Prevent crashing at masterformat system test (CVE-2023-6516)

* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)