Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bind-dnssec-utils-9.16.23-40.el9 RPM for s390x

From CentOS Stream 9 AppStream for s390x

Name: bind-dnssec-utils Distribution: CentOS
Version: 9.16.23 Vendor: CentOS
Release: 40.el9 Build date: Wed Jan 28 11:31:27 2026
Group: Unspecified Build host: s390-06.stream.rdu2.redhat.com
Size: 389458 Source RPM: bind-9.16.23-40.el9.src.rpm
Packager: builder@centos.org
Url: https://www.isc.org/downloads/bind/
Summary: DNSSEC keys and zones management utilities
Bind-dnssec-utils contains a collection of utilities for editing
DNSSEC keys and BIND zone files. These tools provide generation,
revocation and verification of keys and DNSSEC signatures in zone files.

You should install bind-dnssec-utils if you need to sign a DNS zone
or maintain keys for it.

Provides

Requires

License

MPLv2.0

Changelog

* Wed Jan 28 2026 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-40
  - Add forgotten _libdir/named into bind-chroot tmpfiles (RHEL-135629)
* Thu Jan 22 2026 Fedor Vorobev <fvorobev@redhat.com> - 32:9.16.23-39
  - Backport fix for nameserver line processing. (RHEL-79714)
* Fri Dec 12 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-38
  - Add sysusers named user creation (RHEL-132053)
* Fri Dec 12 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-37
  - Create /var/named directories for bind-chroot (RHEL-132053)
* Wed Oct 29 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-36
  - Copy named.* files from /var/named into /usr/share/named
* Wed Oct 29 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-35
  - Prevent cache poisoning due to weak PRNG (CVE-2025-40780)
  - Replace downstream fixes with upstream changes
  - Address various spoofing attacks (CVE-2025-40778)
* Tue Sep 16 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-34
  - Fix failures in idna system test (RHEL-66172)
* Fri Sep 12 2025 Petr Menšík <<pemensik@redhat.com>> - 32:9.16.23-33
  - logrotate: skip if empty and remove old variants (RHEL-113942)
* Wed Sep 03 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-32
  - Decode IDN names on input in all situations in utilities (RHEL-66172)
* Wed Jul 09 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-31
  - Add runtime tunable limit by environment NAMED_MAXADDITIONAL (RHEL-84006)
* Fri Jun 20 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-30
  - Change additional NS to be served partially (RHEL-84006)
* Tue Jun 10 2025 Petr Menšík <pemensik@redhat.com> - 32:9.18.23-29
  - Prevent name.c:670 attributes assertion failed (RHEL-30407)
  - Add extra checks for relative names
* Sat Feb 15 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-28
  - Fix test backport changes
* Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-27
  - Limit additional section records CPU processing (CVE-2024-11187)
* Wed Feb 05 2025 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-26
  - Switch to autopatch changes applying
* Fri Sep 06 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-25
  - Bump version above RHEL 9.5
* Fri Aug 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-24
  - Minor fix of reclimit test backport (CVE-2024-1737)
* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-23
  - Backport addition of max-records-per-type and max-records-per-type options
* Thu Jul 18 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-22
  - Resolve CVE-2024-1975
  - Resolve CVE-2024-1737
  - Resolve CVE-2024-4076
  - Add ability to change runtime limits for max types and records per name
* Tue Jul 09 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-21
  - Increase size of hazard pointer array (RHEL-39131)
* Tue May 28 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-20
  - Ensure bind CVE fixes hits public Stream repository
* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.11.36-19
  - Ensure incompatible bind-dyndb-ldap is not accepted
* Mon Mar 25 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-18
  - Prevent crashing at masterformat system test (CVE-2023-6516)
* Mon Feb 19 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-17
  - Import tests for large DNS messages fix
  - Add downstream change complementing CVE-2023-50387
* Mon Feb 12 2024 Petr Menšík <pemensik@redhat.com> - 32:9.16.23-16
  - Prevent increased CPU load on large DNS messages (CVE-2023-4408)
  - Prevent assertion failure when nxdomain-redirect is used with
   RFC 1918 reverse zones (CVE-2023-5517)
  - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679)
  - Specific recursive query patterns may lead to an out-of-memory
    condition (CVE-2023-6516)
  - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387
    CVE-2023-50868)

Files

/usr/lib/.build-id
/usr/lib/.build-id/0b
/usr/lib/.build-id/0b/322aa33c3314d13f01f6298d5f71242c00e708
/usr/lib/.build-id/0b/9e82725a07f565947172937d2442ccb0aac6bb
/usr/lib/.build-id/2e/1425d04282ac7c34097a8f06158944384fa561
/usr/lib/.build-id/4d/b174fa971058b1240e99c8af2f7d003703144e
/usr/lib/.build-id/62/93c199c622b37bfb13b7ad68b69dbd6bb11f6a
/usr/lib/.build-id/6c
/usr/lib/.build-id/6c/9ecce8069538c2ec9de9d08d1869dc8cb36325
/usr/lib/.build-id/6d
/usr/lib/.build-id/6d/92ac6528eb7fefb4434121acd1fdb1bdb6911a
/usr/lib/.build-id/74
/usr/lib/.build-id/74/07b33e9be8d3fbd1c602bb248a0a547b9f159f
/usr/lib/.build-id/c8
/usr/lib/.build-id/c8/f2345dcc85ea833a16e7d21acc1f76591a05c2
/usr/sbin/dnssec-cds
/usr/sbin/dnssec-checkds
/usr/sbin/dnssec-coverage
/usr/sbin/dnssec-dsfromkey
/usr/sbin/dnssec-importkey
/usr/sbin/dnssec-keyfromlabel
/usr/sbin/dnssec-keygen
/usr/sbin/dnssec-keymgr
/usr/sbin/dnssec-revoke
/usr/sbin/dnssec-settime
/usr/sbin/dnssec-signzone
/usr/sbin/dnssec-verify


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri May 8 03:32:34 2026