Domain Name System (DNS) Server (named)

Edit Package bind

Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.

Refresh
Refresh
Source Files
Filename Size Changed
Makefile.in.diff 0000000753 753 Bytes
baselibs.conf 0000000302 302 Bytes
bind-9.9.2-P1.tar.gz 0007277498 6.94 MB
bind.changes 0000063418 61.9 KB
bind.spec 0000025082 24.5 KB
configure.in.diff 0000000389 389 Bytes
configure.in.diff2 0000000293 293 Bytes
dlz-schema.txt 0000006292 6.14 KB
dnszone-schema.txt 0000005418 5.29 KB
named-bootconf.diff 0000000699 699 Bytes
named.root 0000003048 2.98 KB
perl-path.diff 0000001284 1.25 KB
pid-path.diff 0000001033 1.01 KB
pie_compile.diff 0000003650 3.56 KB
rl-9.9.2p1.patch 0000091756 89.6 KB
vendor-files.tar.bz2 0000020828 20.3 KB
workaround-compile-problem.diff 0000000415 415 Bytes
Revision 86 (latest revision is 208)
Ismail Dönmez's avatar Ismail Dönmez (namtrac) accepted request 144433 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 86)
- Updated to 9.9.2-P1 (bnc#792926)
  https://kb.isc.org/article/AA-00828
  * Security Fixes
    Prevents named from aborting with a require assertion failure on
    servers with DNS64 enabled.  These crashes might occur as a result of
    specific queries that are received.  (Note that this fix is a subset
    of a series of updates that will be included in full in BIND 9.8.5
    and 9.9.3 as change #3388, RT #30996).  [CVE-2012-5688] [RT #30792]
    A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
    Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
    Prevents a named assert (crash) when validating caused by using
    "Bad cache" data before it has been initialized. [CVE-2012-3817]
    [RT #30025]
    A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of
    the named process. [CVE-2012-1667]  [RT #29644]
    ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
New Features
    Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
    Introduces a new tool "dnssec-checkds" command that checks a zone to
    determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;
Comments 2


openSUSE Build Service is sponsored by