Domain Name System (DNS) Server (named)

Edit Package bind

Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.

Refresh
Refresh
Source Files
Filename Size Changed
Makefile.in.diff 0000000753 753 Bytes
baselibs.conf 0000000302 302 Bytes
bind-9.9.2-P2.tar.gz 0007277958 6.94 MB
bind.changes 0000063181 61.7 KB
bind.spec 0000025723 25.1 KB
configure.in.diff 0000000389 389 Bytes
configure.in.diff2 0000000291 291 Bytes
dlz-schema.txt 0000006292 6.14 KB
dnszone-schema.txt 0000005418 5.29 KB
named-bootconf.diff 0000000699 699 Bytes
named.root 0000003048 2.98 KB
perl-path.diff 0000001284 1.25 KB
pid-path.diff 0000001033 1.01 KB
pie_compile.diff 0000003650 3.56 KB
rl-9.9.2p1.patch 0000091756 89.6 KB
vendor-files.tar.bz2 0000020828 20.3 KB
workaround-compile-problem.diff 0000000415 415 Bytes
Revision 9 (latest revision is 10)
Stefan Lijewski's avatar Stefan Lijewski (lijews) accepted request 162840 from Stefan Lijewski's avatar Stefan Lijewski (lijews) (revision 9)
- Updated to 9.9.2-P2
Security Fixes
   Removed the check for regex.h in configure in order to disable
   regex syntax checking, as it exposes BIND to a critical flaw in
   libregex on some platforms. [CVE-2013-2266] [RT #32688]
   https://kb.isc.org/article/AA-00871 (bnc#811876)
   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of  specific queries that are received.  (Note that this
   fix is a subset of a series of updates that will be included in
   full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).
   [CVE-2012-5688] [RT #30792]
   A deliberately constructed combination of records could cause
   named to hang while populating the additional section of a
   response. [CVE-2012-5166] [RT #31090]
   Prevents a named assert (crash) when queried for a record whose
   RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized. [CVE-2012-3817]
   [RT #30025]
   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process. [CVE-2012-1667]  [RT #29644]
   ISC_QUEUE handling for recursive clients was updated to address
   a race condition that could cause a memory leak. This rarely
   occurred with UDP clients, but could be a significant problem
   for a server handling a steady rate of TCP queries. [CVE-2012-3868]
   [RT #29539 & #30233]
New Features
   Elliptic Curve Digital Signature Algorithm keys and signatures
Comments 0
openSUSE Build Service is sponsored by