Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bind-chroot-9.16.23-18.el9_4.6 RPM for aarch64

From AlmaLinux 9.4 AppStream for aarch64

Name: bind-chroot Distribution: AlmaLinux
Version: 9.16.23 Vendor: AlmaLinux
Release: 18.el9_4.6 Build date: Mon Aug 12 17:51:18 2024
Group: Unspecified Build host: arm-builder01.almalinux.org
Size: 4812 Source RPM: bind-9.16.23-18.el9_4.6.src.rpm
Packager: AlmaLinux Packaging Team <packager@almalinux.org>
Url: https://www.isc.org/downloads/bind/
Summary: A chroot runtime environment for the ISC BIND DNS server, named(8)
This package contains a tree of files which can be used as a
chroot(2) jail for the named(8) program from the BIND package.
Based on the code from Jan "Yenya" Kasprzak <kas@fi.muni.cz>

Provides

Requires

License

MPLv2.0

Changelog

* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.6
  - Minor fix of reclimit test backport (CVE-2024-1737)
* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.5
  - Backport addition of max-records-per-type and max-records-per-type options
* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.2
  - Resolve CVE-2024-1975
  - Resolve CVE-2024-1737
  - Resolve CVE-2024-4076
  - Add ability to change runtime limits for max types and records per name
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18.1
  - Rebuild with correct z-stream tag again
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
  - Prevent crashing at masterformat system test (CVE-2023-6516)
* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
  - Import tests for large DNS messages fix
  - Add downstream change complementing CVE-2023-50387
* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
  - Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  - Prevent assertion failure when nxdomain-redirect is used with
   RFC 1918 reverse zones (CVE-2023-5517)
  - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  - Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)
* Thu Dec 07 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-15
  - Update addresses of b.root-servers.net (RHEL-18188)
* Wed Sep 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-14
  - Limit the amount of recursion possible in control channel (CVE-2023-3341)
* Mon Jun 26 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-13
  - Prevent possible endless loop when refreshing stale data (CVE-2023-2911)
* Tue Jun 20 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-12
  - Strengten cache cleaning to prevent overflowing configured limit
    (CVE-2023-2828)
* Mon Feb 27 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-11
  - Correct backport issue in statistics rendering fix (#2126912)
* Sat Feb 25 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-10
  - Handle subtle difference between upstream and rhel (CVE-2022-3094)
* Wed Feb 08 2023 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-9
  - Prevent flooding with UPDATE requests (CVE-2022-3094)
  - Handle RRSIG queries when server-stale is active (CVE-2022-3736)
  - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924)
* Thu Oct 13 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-8
  - Correct regression preventing bind-dyndb-ldap build (#2162795)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-7
  - Prevent freeing zone during statistics rendering (#2101712)
* Tue Oct 04 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-6
  - Bound the amount of work performed for delegations (CVE-2022-2795)
  - Add /usr/lib64/named to bind-chroot (#2129466)
* Thu Sep 22 2022 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-5
  - Fix possible serve-stale related crash (CVE-2022-3080)
  - Fix memory leak in ECDSA verify processing (CVE-2022-38177)
  - Fix memory leak in EdDSA verify processing (CVE-2022-38178)

Files

/etc/named-chroot.files
/usr/lib/systemd/system/named-chroot-setup.service
/usr/lib/systemd/system/named-chroot.service
/usr/libexec/setup-named-chroot.sh
/var/named/chroot
/var/named/chroot/dev
/var/named/chroot/dev/null
/var/named/chroot/dev/random
/var/named/chroot/dev/urandom
/var/named/chroot/dev/zero
/var/named/chroot/etc
/var/named/chroot/etc/crypto-policies
/var/named/chroot/etc/crypto-policies/back-ends
/var/named/chroot/etc/named
/var/named/chroot/etc/named.conf
/var/named/chroot/etc/pki
/var/named/chroot/etc/pki/dnssec-keys
/var/named/chroot/proc
/var/named/chroot/proc/sys
/var/named/chroot/proc/sys/net
/var/named/chroot/proc/sys/net/ipv4
/var/named/chroot/run
/var/named/chroot/run/named
/var/named/chroot/usr
/var/named/chroot/usr/lib64
/var/named/chroot/usr/lib64/bind
/var/named/chroot/usr/lib64/named
/var/named/chroot/usr/share/GeoIP
/var/named/chroot/var
/var/named/chroot/var/log
/var/named/chroot/var/named
/var/named/chroot/var/run
/var/named/chroot/var/tmp


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 12 07:34:42 2024