Linux repositories inspector

libisccc140 - Command Channel Library used by BIND

The Berkeley Internet Name Domain (BIND) implements an Internet domain name server. BIND is the most widely-used name server software on the Internet, and is supported by the Internet Software Consortium, www.isc.org.
This package delivers the libisccc shared library used by BIND's daemons and clients, particularly rndc.
Original maintainer
9.10.3.dfsg.P4
Debian iconDebian 9.0
Ubuntu iconUbuntu 17.10
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 9.0 stretch/maindeb1:9.10.3.dfsg.P4-12.3+deb9u42018-03-14194 kiB234 kiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb1:9.10.3.dfsg.P4-12.3+deb9u5Jun 17194 kiB234 kiB
Ubuntu iconUbuntu 17.10 artful/maindeb1:9.10.3.dfsg.P4-12.6ubuntu12017-11-1016.1 kiB80 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb1:9.10.3.dfsg.P4-12.6ubuntu1.12018-01-1716.2 kiB80 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb1:9.10.3.dfsg.P4-12.6ubuntu1.12018-01-1716.2 kiB80 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb1:9.10.3.dfsg.P4-82017-11-1015.9 kiB77 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-proposed/maindeb1:9.10.3.dfsg.P4-8ubuntu1.150 - 16:5515.9 kiB79 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb1:9.10.3.dfsg.P4-8ubuntu1.14Jun 1715.9 kiB79 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb1:9.10.3.dfsg.P4-8ubuntu1.14Jun 1715.9 kiB79 kiB

Latest updates

Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Yesterday
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Yesterday
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.15 introduced

0 - 16:55
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Aug 01
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Aug 01
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Aug 01
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Aug 01
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 reintroduced

Jul 15
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 removed

Jul 15
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 introduced

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.12 to 1:9.10.3.dfsg.P4-8ubuntu1.14

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.12 to 1:9.10.3.dfsg.P4-8ubuntu1.14

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.11 to 1:9.10.3.dfsg.P4-8ubuntu1.12

Feb 22
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.11 to 1:9.10.3.dfsg.P4-8ubuntu1.12

Feb 22
Debian 9.0 icon

Debian 9.0 stretch-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u3 removed

Jan 12
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.10 to 1:9.10.3.dfsg.P4-8ubuntu1.11

Jan 12
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.10 to 1:9.10.3.dfsg.P4-8ubuntu1.11

Jan 12
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u4 removed

2018-03-14
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1:9.10.3.dfsg.P4-12.3+deb9u3 to 1:9.10.3.dfsg.P4-12.3+deb9u4

2018-03-14
  • Non-maintainer upload by the Security Team.
  • Addresses could be referenced after being freed in resolver.c, causing an assertion failure. (CVE-2017-3145)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u4 introduced

2018-02-08
  • Non-maintainer upload by the Security Team.
  • Addresses could be referenced after being freed in resolver.c, causing an assertion failure. (CVE-2017-3145)
⇧ Top