| Name: | bind |
|---|---|
| Epoch: | 32 |
| Version: | 9.11.4 |
| Release: | 26.P2.el8 |
| Architecture: | x86_64 |
| Group: | Unspecified |
| Size: | 4977357 |
| License: | MPLv2.0 |
| RPM: | bind-9.11.4-26.P2.el8.x86_64.rpm |
| Source RPM: | bind-9.11.4-26.P2.el8.src.rpm |
| Build Date: | Sun Nov 10 2019 |
| Build Host: | jenkins-10-147-72-125-5175330d-7169-4500-9dab-ee68de92c90a.appad1iad.osdevelopmeniad.oraclevcn.com |
| Vendor: | Oracle America |
| URL: | http://www.isc.org/products/BIND/ |
| Summary: | The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server |
| Description: | BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. |
- Permit explicit disabling of RSAMD5 in FIPS mode (#1737407)
- Fix CVE-2018-5745 - Fix CVE-2019-6465
- Do not override random numbers provider in DHCP (#1668682)
- Report errors on invalid IDN 2008 names (#1679307)
- Fix CVE-2019-6471
- Fix random generator initialization
- Fix multilib conflict of devel packages (#1666785)
- Add support for OpenSSL provided random data - Disable often failing unit test random_test - Add /dev/urandom to chroot
- Fix zone2ldap tool memory management (#1602451) - Add support for OpenSSL provided random data
- Fix inefective limit of TCP clients (CVE-2018-5743)