Linux repositories inspector

liblwres141 - Lightweight Resolver Library used by BIND

The Berkeley Internet Name Domain (BIND) implements an Internet domain name server. BIND is the most widely-used name server software on the Internet, and is supported by the Internet Software Consortium, www.isc.org.
This package delivers the liblwres shared library used by BIND's daemons and clients.
Original maintainer
9.10.3.dfsg.P4
Debian iconDebian 9.0
Ubuntu iconUbuntu 17.10
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 9.0 stretch/maindeb1:9.10.3.dfsg.P4-12.3+deb9u5Sep 07209 kiB269 kiB
Ubuntu iconUbuntu 17.10 artful/maindeb1:9.10.3.dfsg.P4-12.6ubuntu12017-11-1033.7 kiB115 kiB
Ubuntu iconUbuntu 17.10 artful-security/maindeb1:9.10.3.dfsg.P4-12.6ubuntu1.12018-01-1733.6 kiB115 kiB
Ubuntu iconUbuntu 17.10 artful-updates/maindeb1:9.10.3.dfsg.P4-12.6ubuntu1.12018-01-1733.6 kiB115 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb1:9.10.3.dfsg.P4-82017-11-1032.6 kiB113 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb1:9.10.3.dfsg.P4-8ubuntu1.14Jun 1733.3 kiB115 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb1:9.10.3.dfsg.P4-8ubuntu1.15Sep 0233.3 kiB115 kiB

Latest updates

Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.15 reintroduced

Oct 02
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.15 removed

Oct 02
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 removed

Sep 07
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1:9.10.3.dfsg.P4-12.3+deb9u4 to 1:9.10.3.dfsg.P4-12.3+deb9u5

Sep 07
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.15 removed

Sep 05
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.14 to 1:9.10.3.dfsg.P4-8ubuntu1.15

Sep 02
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Aug 15
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Aug 15
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-proposed/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.15 introduced

Aug 13
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Aug 02
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 reintroduced

Aug 02
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Aug 02
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Version 1:9.10.3.dfsg.P4-8ubuntu1.14 removed

Aug 02
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 reintroduced

Jul 15
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 removed

Jul 15
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1:9.10.3.dfsg.P4-12.3+deb9u5 introduced

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.12 to 1:9.10.3.dfsg.P4-8ubuntu1.14

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.12 to 1:9.10.3.dfsg.P4-8ubuntu1.14

Jun 17
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.11 to 1:9.10.3.dfsg.P4-8ubuntu1.12

Feb 22
  • SECURITY UPDATE: assertion failure when a trust anchor rolls over to an unsupported key algorithm when using managed-keys
    • debian/patches/CVE-2018-5745-pre.patch: enhance rfc 5011 logging in lib/dns/zone.c,
    • debian/patches/CVE-2018-5745.patch: properly handle situations when the key tag cannot be computed in lib/dns/include/dst/dst.h, lib/dns/zone.c.
    • CVE-2018-5745
  • SECURITY UPDATE: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable
    • debian/patches/CVE-2019-6465.patch: handle zone transfers marked in the zone table as a DLZ zone bin/named/xfrout.c.
    • CVE-2019-6465
Ubuntu 16.04 LTS icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 1:9.10.3.dfsg.P4-8ubuntu1.11 to 1:9.10.3.dfsg.P4-8ubuntu1.12

Feb 22
  • SECURITY UPDATE: assertion failure when a trust anchor rolls over to an unsupported key algorithm when using managed-keys
    • debian/patches/CVE-2018-5745-pre.patch: enhance rfc 5011 logging in lib/dns/zone.c,
    • debian/patches/CVE-2018-5745.patch: properly handle situations when the key tag cannot be computed in lib/dns/include/dst/dst.h, lib/dns/zone.c.
    • CVE-2018-5745
  • SECURITY UPDATE: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable
    • debian/patches/CVE-2019-6465.patch: handle zone transfers marked in the zone table as a DLZ zone bin/named/xfrout.c.
    • CVE-2019-6465
⇧ Top