ID | 26728 |
Package Name | bind-dyndb-ldap |
Version | 11.11 |
Release | 2.el9 |
Epoch | |
Source | git+http://git.inferitos.ru/rpms/bind-dyndb-ldap#a35f2a15bebb72f7d1432ccedb40c9bc2b885d61 |
Summary |
Description |
Built by | tigro |
State |
complete
|
Volume |
DEFAULT |
Started | Fri, 28 Mar 2025 11:20:36 MSK |
Completed | Fri, 28 Mar 2025 11:22:24 MSK |
Task | build (inferit-9_6-bootstrap, /rpms/bind-dyndb-ldap/:changed/i9c-beta/bind-dyndb-ldap-11.11-2.el9) |
Extra | {'source': {'original_url': 'git+http://git.inferitos.ru/rpms/bind-dyndb-ldap/?#changed/i9c-beta/bind-dyndb-ldap-11.11-2.el9'}} |
Tags |
|
RPMs |
src | |
|
bind-dyndb-ldap-11.11-2.el9.src.rpm (info) (download) |
aarch64 |
|
bind-dyndb-ldap-11.11-2.el9.aarch64.rpm (info) (download)
|
|
bind-dyndb-ldap-debuginfo-11.11-2.el9.aarch64.rpm (info) (download)
|
|
bind-dyndb-ldap-debugsource-11.11-2.el9.aarch64.rpm (info) (download)
|
i686 |
|
bind-dyndb-ldap-11.11-2.el9.i686.rpm (info) (download)
|
|
bind-dyndb-ldap-debuginfo-11.11-2.el9.i686.rpm (info) (download)
|
|
bind-dyndb-ldap-debugsource-11.11-2.el9.i686.rpm (info) (download)
|
x86_64 |
|
bind-dyndb-ldap-11.11-2.el9.x86_64.rpm (info) (download)
|
|
bind-dyndb-ldap-debuginfo-11.11-2.el9.x86_64.rpm (info) (download)
|
|
bind-dyndb-ldap-debugsource-11.11-2.el9.x86_64.rpm (info) (download)
|
|
Logs |
|
Changelog |
* Thu Mar 20 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 11.11-2
- Rebuilt for MSVSphere 9.6-beta
* Wed Feb 12 2025 Thomas Woerner <twoerner@redhat.com> - 11.11-2
- Release bump, fixed date for previous changelog entry
Resolves: RHEL-78927
* Tue Feb 11 2025 Thomas Woerner <twoerner@redhat.com> - 11.11-1
- Release 11.11, Support BIND 9.18
Resolves: RHEL-78927
* Fri Sep 06 2024 Petr Menšík <pemensik@redhat.com> - 11.9-11
- Bump version above RHEL 9.5
* Wed Aug 07 2024 Petr Menšík <pemensik@redhat.com> - 11.9-10
- Rebuilt for BIND CVE-2024-1737 fixes (CVE-2024-1737)
* Thu Feb 22 2024 Petr Menšík <pemensik@redhat.com> - 11.9-9
- Rebuild required for BIND changes for KeyTrap change (CVE-2023-50387)
|