|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] bind (SSA:2021-300-01)
Date: Wed, 27 Oct 2021 18:13:50 -0700 (PDT) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] bind (SSA:2021-300-01)
New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.36-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and the following security issue:
The "lame-ttl" option is now forcibly set to 0. This effectively disables
the lame server cache, as it could previously be abused by an attacker to
significantly degrade resolver performance.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.36-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.36-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.36-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.36-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.36-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.36-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.22-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.22-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 package:
955139c6c3c34b2767adbc54a93de226 bind-9.11.36-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
4c78947768d419c9690e90e40b2719a6 bind-9.11.36-x86_64-1_slack14.0.txz
Slackware 14.1 package:
96d5de40298ae8c366b1282bb5d5cde0 bind-9.11.36-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
d9fd555c6b421dde1c0d9b5ab4f6ff74 bind-9.11.36-x86_64-1_slack14.1.txz
Slackware 14.2 package:
bc44771cafcac6ca49d845cc0df03de2 bind-9.11.36-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
4dd25f00abe0ff5b509beb42782ffd75 bind-9.11.36-x86_64-1_slack14.2.txz
Slackware -current package:
e31b1aaea8bd30ac6f6ec84f1b6462a3 n/bind-9.16.22-i586-1.txz
Slackware x86_64 -current package:
f94f3aa80abdcab4a764a43b3c299648 n/bind-9.16.22-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.11.36-i586-1_slack14.2.txz
Then, restart the name server:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAmF5+PIACgkQakRjwEAQIjMU4ACfSn302vHBmFH+XLAZrng3qbUl
Cf8An38iHx5YpvTqNVC0WK/eZG+jbp09
=LwPu
-----END PGP SIGNATURE-----
|
| |