Domain Name System (DNS) Server (named)
Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Evergreen:11.2/bind && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
Makefile.in.diff | 0000000753 753 Bytes | |
baselibs.conf | 0000000302 302 Bytes | |
bind-9.9.2-P2.tar.gz | 0007277958 6.94 MB | |
bind.changes | 0000063181 61.7 KB | |
bind.spec | 0000025723 25.1 KB | |
configure.in.diff | 0000000389 389 Bytes | |
configure.in.diff2 | 0000000291 291 Bytes | |
dlz-schema.txt | 0000006292 6.14 KB | |
dnszone-schema.txt | 0000005418 5.29 KB | |
named-bootconf.diff | 0000000699 699 Bytes | |
named.root | 0000003048 2.98 KB | |
perl-path.diff | 0000001284 1.25 KB | |
pid-path.diff | 0000001033 1.01 KB | |
pie_compile.diff | 0000003650 3.56 KB | |
rl-9.9.2p1.patch | 0000091756 89.6 KB | |
vendor-files.tar.bz2 | 0000020828 20.3 KB | |
workaround-compile-problem.diff | 0000000415 415 Bytes |
Revision 9 (latest revision is 10)
Stefan Lijewski (lijews)
accepted
request 162840
from
Stefan Lijewski (lijews)
(revision 9)
- Updated to 9.9.2-P2 Security Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [CVE-2013-2266] [RT #32688] https://kb.isc.org/article/AA-00871 (bnc#811876) Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures
Comments 0