The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server
12f1cd3444
6192. [security] A query that prioritizes stale data over lookup triggers a fetch to refresh the stale data in cache. If the fetch is aborted for exceeding the recursion quota, it was possible for 'named' to enter an infinite callback loop and crash due to stack overflow. This has been fixed. (CVE-2023-2911) [GL #4089] Resolves: CVE-2023-2911 |
||
---|---|---|
tests | ||
.gitignore | ||
bind93-rh490837.patch | ||
bind97-exportlib.patch | ||
bind97-rh645544.patch | ||
bind-9.5-dlz-64bit.patch | ||
bind-9.5-PIE.patch | ||
bind-9.9.1-P2-dlz-libdb.patch | ||
bind-9.10-dist-native-pkcs11.patch | ||
bind-9.11-feature-test-named.patch | ||
bind-9.11-fips-disable.patch | ||
bind-9.11-fips-tests.patch | ||
bind-9.11-kyua-pkcs11.patch | ||
bind-9.11-rh1666814.patch | ||
bind-9.11-tests-variants.patch | ||
bind-9.11.12.tar.gz.asc | ||
bind-9.14-config-pkcs11.patch | ||
bind-9.14-json-c.patch | ||
bind-9.14.7.tar.gz.asc | ||
bind-9.16-CVE-2021-25220-test.patch | ||
bind-9.16-CVE-2021-25220.patch | ||
bind-9.16-CVE-2022-0396.patch | ||
bind-9.16-CVE-2022-2795.patch | ||
bind-9.16-CVE-2022-3080.patch | ||
bind-9.16-CVE-2022-3094-1.patch | ||
bind-9.16-CVE-2022-3094-2.patch | ||
bind-9.16-CVE-2022-3094-3.patch | ||
bind-9.16-CVE-2022-3094-test.patch | ||
bind-9.16-CVE-2022-3736.patch | ||
bind-9.16-CVE-2022-3924.patch | ||
bind-9.16-CVE-2022-38177.patch | ||
bind-9.16-CVE-2022-38178.patch | ||
bind-9.16-CVE-2023-2828.patch | ||
bind-9.16-CVE-2023-2911-1.patch | ||
bind-9.16-CVE-2023-2911-2.patch | ||
bind-9.16-CVE-2023-2911-3.patch | ||
bind-9.16-redhat_doc.patch | ||
bind-9.16-rh2101712.patch | ||
bind-9.16-rh2133889.patch | ||
bind.spec | ||
bind.tmpfiles.d | ||
Changes.md | ||
ci.fmf | ||
codesign2021.txt | ||
gating.yaml | ||
generate-rndc-key.sh | ||
ldap2zone.c | ||
makefile-replace-libs.py | ||
named-chroot-setup.service | ||
named-chroot.files | ||
named-chroot.service | ||
named-pkcs11.service | ||
named-setup-rndc.service | ||
named.conf | ||
named.conf.sample | ||
named.empty | ||
named.localhost | ||
named.logrotate | ||
named.loopback | ||
named.rfc1912.zones | ||
named.root | ||
named.root.key | ||
named.rwtab | ||
named.service | ||
named.sysconfig | ||
README.md | ||
setup-named-chroot.sh | ||
setup-named-softhsm.sh | ||
softhsm2.conf.in | ||
sources | ||
trusted-key.key |
BIND 9
BIND (Berkeley Internet Name Domain) is a complete, highly portable implementation of the DNS (Domain Name System) protocol.
Internet Systems Consortium (https://www.isc.org), a 501(c)(3) public benefit corporation dedicated to providing software and services in support of the Internet infrastructure, developed BIND 9 and is responsible for its ongoing maintenance and improvement.
More details about upstream project can be found on their gitlab. This repository contains only upstream sources and packaging instructions for Fedora Project.
Subpackages
The package contains several subpackages, some of them can be disabled on rebuild.
- bind -- named daemon providing DNS server
- bind-utils -- set of tools to analyse DNS responses or update entries (dig, host)
- bind-doc -- documentation for current bind, BIND 9 Administrator Reference Manual.
- bind-license -- Shared license for all packages but bind-export-libs.
- bind-pkcs11 -- named daemon built with native PKCS#11 support. Can be disabled by
--without PKCS11
. - bind-libs and bind-libs-lite -- Shared libraries used by some others programs
- bind-devel -- Development headers for libs.
- bind-dlz-* -- Dynamic loadable DLZ plugins with support for external databases
Optional features
- GSSTSIG -- Support for Kerberos authentication in BIND.
- LMDB -- Support for dynamic database for managing runtime added zones. Provides faster removal of added zone with much less overhead. But requires lmdb linked to base libs.
- DLZ -- Support for dynamic loaded modules providing support for features bind-sdb provides, but only small module is required.