[ Все A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Проект bind-32:9.16.23-24.el9_5

Имя bind
Эпоха 32
Версия 9.16.23
Релиз 24.el9_5
Сайт https://www.isc.org/downloads/bind/
Лицензия MPLv2.0
Время сборки 2025-02-20 16:12:29
Хост сборки certified-builder01.msvsphere-os.ru
Краткое описание The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
Репозитории OS
Полное описание BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly.
Эррата
× Full screenshot
Пакеты link
Пакет Краткое описание Контрольная сумма SHA-256
x86_64
bind-32:9.16.23-24.el9_5.x86_64 The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server 238d798a099c189bfcdf5d3130911f28e29010c17e19bb129b04ec5cce1f16de download
bind-chroot-32:9.16.23-24.el9_5.x86_64 A chroot runtime environment for the ISC BIND DNS server, named(8) 2340d88a84e057d3ce6a72a6eb6324bea50feef12f37fcbacc87c25e5d11e162 download
bind-libs-32:9.16.23-24.el9_5.x86_64 Libraries used by the BIND DNS packages 8e863357fff4eb3fb48c4270a210fb22fae764dc3775826c09670941eccbcefa download
bind-utils-32:9.16.23-24.el9_5.x86_64 Utilities for querying DNS name servers d11b14ce421d430dbe04f710b39d1940773ca0ca728e5c68ba9d5e1e3c456b78 download
noarch
bind-license-32:9.16.23-24.el9_5.noarch License of the BIND DNS suite baa10486d9c5a8b2a6a56b7bac6d947361a833bfbf2d912db063541f541e9628 download
src
bind-32:9.16.23-24.el9_5.src The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server 5a12b61d6f1ef820bfbea54179c4f514e5485cb2db19a5f4a9677f9a515b81f5 download
История изменений link
* Wed Oct 16 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 9.16.23-24
- Rebuilt for MSVSphere 9.5

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24
- Minor fix of reclimit test backport (CVE-2024-1737)

* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23
- Backport addition of max-records-per-type and max-records-per-type options

* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22
- Resolve CVE-2024-1975
- Resolve CVE-2024-1737
- Resolve CVE-2024-4076
- Add ability to change runtime limits for max types and records per name

* Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21
- Increase size of hazard pointer array (RHEL-39131)

* Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20
- Ensure bind CVE fixes hits public Stream repository

* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19
- Ensure incompatible bind-dyndb-ldap is not accepted

* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
- Prevent crashing at masterformat system test (CVE-2023-6516)

* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
- Import tests for large DNS messages fix
- Add downstream change complementing CVE-2023-50387

* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
- Prevent increased CPU load on large DNS messages (CVE-2023-4408)
- Prevent assertion failure when nxdomain-redirect is used with
 RFC 1918 reverse zones (CVE-2023-5517)
- Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
- Specific recursive query patterns may lead to an out-of-memory
  condition (CVE-2023-6516)
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
  CVE-2023-50868)