|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] bind (SSA:2017-041-01)
Date: Fri, 10 Feb 2017 12:40:38 -0800 (PST) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] bind (SSA:2017-041-01)
New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz: Upgraded.
This update fixes a denial-of-service vulnerability. Under some conditions
when using both DNS64 and RPZ to rewrite query responses, query processing
can resume in an inconsistent state leading to either an INSIST assertion
failure or an attempt to read through a NULL pointer.
For more information, see:
https://kb.isc.org/article/AA-01453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.9.9_P6-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.9.9_P6-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.9.9_P6-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.9_P6-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.9_P6-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.9.9_P6-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.9.9_P6-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.10.4_P6-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.11.0_P3-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.11.0_P3-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.0 package:
186dec22b5d77adcb3ecd60d6b88f9f4 bind-9.9.9_P6-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
324ac756fc7537acd16329dd915cf8dd bind-9.9.9_P6-x86_64-1_slack13.0.txz
Slackware 13.1 package:
25f1340ac4aca4f84dbda2934baebee5 bind-9.9.9_P6-i486-1_slack13.1.txz
Slackware x86_64 13.1 package:
c9116a4b4da59c0915f11ded245be630 bind-9.9.9_P6-x86_64-1_slack13.1.txz
Slackware 13.37 package:
ec66023fdc318d17fd1b5884016d0280 bind-9.9.9_P6-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
0f0d7a0b0b09149821cd3eff076b0d00 bind-9.9.9_P6-x86_64-1_slack13.37.txz
Slackware 14.0 package:
53b7d2337bffac26f2954c890839fb35 bind-9.9.9_P6-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
9a05a4e8070e70cfa37d19ab86b61d1b bind-9.9.9_P6-x86_64-1_slack14.0.txz
Slackware 14.1 package:
7fd83b334b5eef2af3402f3337671c9d bind-9.9.9_P6-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
231dce9a8d19178aefc44d7f20b7df74 bind-9.9.9_P6-x86_64-1_slack14.1.txz
Slackware 14.2 package:
570b3b7b6cbc2fa6d0e412f0d9aa5591 bind-9.10.4_P6-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
3eb8a784f19905d3e9e9e029ace66c00 bind-9.10.4_P6-x86_64-1_slack14.2.txz
Slackware -current package:
55c8d651b99c40f2c70f67b16836b90e n/bind-9.11.0_P3-i586-1.txz
Slackware x86_64 -current package:
76617f2b30b45237cd3f126af4c6927e n/bind-9.11.0_P3-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.10.4_P6-i586-1_slack14.2.txz
Then, restart the name server:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAlieJSYACgkQakRjwEAQIjNv7QCfbnW0ZiP2L4FeHL/uerEFO76I
W3gAn3gsePzQt8Nsk08+6cpd3JLnhbmf
=LfO4
-----END PGP SIGNATURE-----
|
| |