Name: | bind-sdb |
---|---|
Epoch: | 32 |
Version: | 9.11.4 |
Release: | 26.0.1.P2.el7_9.16 |
Architecture: | x86_64 |
Group: | Unspecified |
Size: | 948417 |
License: | MPLv2.0 |
RPM: | bind-sdb-9.11.4-26.0.1.P2.el7_9.16.x86_64.rpm |
Source RPM: | bind-9.11.4-26.0.1.P2.el7_9.16.src.rpm |
Build Date: | Mon Oct 14 2024 |
Build Host: | build-ol7-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.isc.org/products/BIND/ |
Summary: | BIND server with database backends and DLZ support |
Description: | BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named-sdb) which has compiled-in SDB (Simplified Database Backend) which includes support for using alternative Zone Databases stored in an LDAP server (ldapdb), a postgreSQL database (pgsqldb), an sqlite database (sqlitedb), or in the filesystem (dirdb), in addition to the standard in-memory RBT (Red Black Tree) zone database. It also includes support for DLZ (Dynamic Loadable Zones) |
- Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Add ability to change runtime limits for max types and records per name
- Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868) - Add missing design by contract tests to dns_catz* - Speed up parsing of DNS messages with many different names (CVE-2023-4408) - Do not use header_prev in expire_lru_headers
- Limit the amount of recursion possible in control channel (CVE-2023-3341)
- Prevent the cache going over the configured limit (CVE-2023-2828)
- Tighten cache protection against record from forwarders (CVE-2021-25220)
- Include test of forwarders (CVE-2021-25220)
- Prevent excessive resource use while processing large delegations. (CVE-2022-2795)
- Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)
- Fix possible assertion failure isc_refcount_current == 0 in free_rbtdb (#1935152)
- Prevent a race after zone load (#2011220)