Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bind-9.16.23-24.el9 RPM for s390x

From CentOS Stream 9 AppStream for s390x

Name: bind Distribution: CentOS
Version: 9.16.23 Vendor: CentOS
Release: 24.el9 Build date: Thu Sep 5 16:08:23 2024
Group: Unspecified Build host: s390-07.stream.rdu2.redhat.com
Size: 1480970 Source RPM: bind-9.16.23-24.el9.src.rpm
Packager: builder@centos.org
Url: https://www.isc.org/downloads/bind/
Summary: The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols. BIND includes a DNS server (named),
which resolves host names to IP addresses; a resolver library
(routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating properly.

Provides

Requires

License

MPLv2.0

Changelog

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24
  - Minor fix of reclimit test backport (CVE-2024-1737)
* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23
  - Backport addition of max-records-per-type and max-records-per-type options
* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22
  - Resolve CVE-2024-1975
  - Resolve CVE-2024-1737
  - Resolve CVE-2024-4076
  - Add ability to change runtime limits for max types and records per name
* Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21
  - Increase size of hazard pointer array (RHEL-39131)
* Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20
  - Ensure bind CVE fixes hits public Stream repository
* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19
  - Ensure incompatible bind-dyndb-ldap is not accepted
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
  - Prevent crashing at masterformat system test (CVE-2023-6516)
* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
  - Import tests for large DNS messages fix
  - Add downstream change complementing CVE-2023-50387
* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
  - Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  - Prevent assertion failure when nxdomain-redirect is used with
   RFC 1918 reverse zones (CVE-2023-5517)
  - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  - Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)
* Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15
  - Update addresses of b.root-servers.net (RHEL-18188)
* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14
  - Limit the amount of recursion possible in control channel (CVE-2023-3341)
* Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13
  - Prevent possible endless loop when refreshing stale data (CVE-2023-2911)
* Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12
  - Strengten cache cleaning to prevent overflowing configured limit
    (CVE-2023-2828)
* Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11
  - Correct backport issue in statistics rendering fix (#2126912)
* Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10
  - Handle subtle difference between upstream and rhel (CVE-2022-3094)
* Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9
  - Prevent flooding with UPDATE requests (CVE-2022-3094)
  - Handle RRSIG queries when server-stale is active (CVE-2022-3736)
  - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924)
* Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8
  - Correct regression preventing bind-dyndb-ldap build (#2162795)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7
  - Prevent freeing zone during statistics rendering (#2101712)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6
  - Bound the amount of work performed for delegations (CVE-2022-2795)
  - Add /usr/lib64/named to bind-chroot (#2129466)
* Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5
  - Fix possible serve-stale related crash (CVE-2022-3080)
  - Fix memory leak in ECDSA verify processing (CVE-2022-38177)
  - Fix memory leak in EdDSA verify processing (CVE-2022-38178)

Files

/etc/logrotate.d/named
/etc/named
/etc/named.conf
/etc/named.rfc1912.zones
/etc/named.root.key
/etc/rndc.conf
/etc/rndc.key
/etc/rwtab.d/named
/etc/sysconfig/named
/run/named
/usr/bin/mdig
/usr/bin/named-rrchecker
/usr/lib/.build-id
/usr/lib/.build-id/07
/usr/lib/.build-id/07/f42efab0639a91088e220cc8aff082042b4b83
/usr/lib/.build-id/24
/usr/lib/.build-id/24/91bbc4519f6130feda2d3a353c4a491a815f25
/usr/lib/.build-id/51
/usr/lib/.build-id/51/d34a957a31591763b89ae77c18dfb9faf7ee55
/usr/lib/.build-id/6d
/usr/lib/.build-id/6d/3f24efe039474e1c8515817a4149b36cefbd9a
/usr/lib/.build-id/76
/usr/lib/.build-id/76/78ba4476a2152e5b02baaaa8b3ac5a3caaa030
/usr/lib/.build-id/bb
/usr/lib/.build-id/bb/a5f86e0b0eeaba04cb1f06ebae150820a7387b
/usr/lib/.build-id/da
/usr/lib/.build-id/da/e6a75570310a59ba6cc6be31233e5ded6997b3
/usr/lib/.build-id/f9
/usr/lib/.build-id/f9/dae78f2af43a6cd0b7ba4a03b13ae61b9380e8
/usr/lib/systemd/system/named-setup-rndc.service
/usr/lib/systemd/system/named.service
/usr/lib/tmpfiles.d/named.conf
/usr/lib64/bind
/usr/lib64/named
/usr/lib64/named/filter-aaaa.so
/usr/libexec/generate-rndc-key.sh
/usr/sbin/named
/usr/sbin/named-checkconf
/usr/sbin/named-journalprint
/usr/sbin/rndc
/usr/sbin/rndc-confgen
/usr/share/doc/bind
/usr/share/doc/bind/CHANGES
/usr/share/doc/bind/README
/usr/share/doc/bind/named.conf.default
/usr/share/doc/bind/sample
/usr/share/doc/bind/sample/etc
/usr/share/doc/bind/sample/etc/named.conf
/usr/share/doc/bind/sample/etc/named.rfc1912.zones
/usr/share/doc/bind/sample/var
/usr/share/doc/bind/sample/var/named
/usr/share/doc/bind/sample/var/named/data
/usr/share/doc/bind/sample/var/named/my.external.zone.db
/usr/share/doc/bind/sample/var/named/my.internal.zone.db
/usr/share/doc/bind/sample/var/named/named.ca
/usr/share/doc/bind/sample/var/named/named.empty
/usr/share/doc/bind/sample/var/named/named.localhost
/usr/share/doc/bind/sample/var/named/named.loopback
/usr/share/doc/bind/sample/var/named/slaves
/usr/share/doc/bind/sample/var/named/slaves/my.ddns.internal.zone.db
/usr/share/doc/bind/sample/var/named/slaves/my.slave.internal.zone.db
/usr/share/man/man1/mdig.1.gz
/usr/share/man/man1/named-rrchecker.1.gz
/usr/share/man/man5/named.conf.5.gz
/usr/share/man/man5/rndc.conf.5.gz
/usr/share/man/man8/filter-aaaa.8.gz
/usr/share/man/man8/named-checkconf.8.gz
/usr/share/man/man8/named-journalprint.8.gz
/usr/share/man/man8/named.8.gz
/usr/share/man/man8/rndc-confgen.8.gz
/usr/share/man/man8/rndc.8.gz
/var/log/named.log
/var/named
/var/named/data
/var/named/dynamic
/var/named/named.ca
/var/named/named.empty
/var/named/named.localhost
/var/named/named.loopback
/var/named/slaves


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Dec 17 09:37:10 2024