Modern, advanced and high performance recursing/non authoritative nameserver
PowerDNS Recursor is a non authoritative/recursing DNS server.
Use this package if you need a dns cache for your network.
Authors:
--------
http://www.powerdns.com
- Devel package for openSUSE:Factory
-
4
derived packages
- Links to openSUSE:Factory / pdns-recursor
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:dns/pdns-recursor && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_constraints | 0000000114 114 Bytes | |
_service | 0000000272 272 Bytes | |
boost_context.patch | 0000000325 325 Bytes | |
cargo_build_fix.patch | 0000001181 1.15 KB | |
pdns-recursor-4.3.2.tar.bz2 | 0001354549 1.29 MB | |
pdns-recursor-4.3.2.tar.bz2.sig | 0000000310 310 Bytes | |
pdns-recursor-5.1.2.tar.bz2 | 0001723288 1.64 MB | |
pdns-recursor-5.1.2.tar.bz2.sig | 0000000310 310 Bytes | |
pdns-recursor.changes | 0000066561 65 KB | |
pdns-recursor.init | 0000011686 11.4 KB | |
pdns-recursor.keyring | 0000024519 23.9 KB | |
pdns-recursor.spec | 0000004624 4.52 KB | |
recursor.conf | 0000002123 2.07 KB | |
series | 0000000042 42 Bytes | |
vendor.tar.zst | 0006765438 6.45 MB |
Revision 139 (latest revision is 216)
Adam Majer (adamm)
committed
(revision 139)
- update to 4.3.2 * Fixes a access restriction bypass vulnerability where ACL applied to the internal web server via webserver-allow-from is not properly enforced, allowing a remote attacker to send HTTP queries to the internal web server, bypassing the restriction. (CVE-2020-14196, bsc#1173302) * improves CNAME loop detection * Fix the handling of DS queries for the root * Fix RPZ removals when an update has several deltas
Comments 1
The _service file is not up to date with version 5.0.4 and so not vendor.tar.zst either.