|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] bind (SSA:2012-166-01)
Date: Thu, 14 Jun 2012 16:45:02 -0700 (PDT) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] bind (SSA:2012-166-01)
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.
Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
This release fixes an issue that could crash BIND, leading to a denial of
service. It also fixes the so-called "ghost names attack" whereby a
remote attacker may trigger continued resolvability of revoked domain names.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
(* Security fix *)
+--------------------------+
On Slackware 8.1, only CVE-2012-1667 was patched (see ChangeLog).
IMPORTANT NOTE FOR ON SLACKWARE 9.0 - 13.1:
These versions were upgraded with a new version of BIND, _not_ a patched one.
It is likely to be more strict about the correctness of configuration files.
Care should be taken about deploying this upgrade on production servers to
avoid an unintended interruption of service.
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/bind-9.4_ESV_R5-i386-2_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/bind-9.7.6_P1-i386-1_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/bind-9.7.6_P1-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/bind-9.7.6_P1-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/bind-9.7.6_P1-i486-1_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/bind-9.7.6_P1-i486-1_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/bind-9.7.6_P1-i486-1_slack11.0.tgz
Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/bind-9.7.6_P1-i486-1_slack12.0.tgz
Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/bind-9.7.6_P1-i486-1_slack12.1.tgz
Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/bind-9.7.6_P1-i486-1_slack12.2.tgz
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.7.6_P1-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.7.6_P1-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.7.6_P1-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.7.6_P1-x86_64-1_slack13.37.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.9.1_P1-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.9.1_P1-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 8.1 package:
368676b58d45aeb44bb2709fef9b9dc9 bind-9.4_ESV_R5-i386-2_slack8.1.tgz
Slackware 9.0 package:
496c543f5cead74b532701c4a5ce2e9a bind-9.7.6_P1-i386-1_slack9.0.tgz
Slackware 9.1 package:
c2fa98d41c6192f9dee90fbf20087f74 bind-9.7.6_P1-i486-1_slack9.1.tgz
Slackware 10.0 package:
6f6d80d82bfad02b31c6cf978f9c4eb3 bind-9.7.6_P1-i486-1_slack10.0.tgz
Slackware 10.1 package:
3b044cb5268b5aa2a730e6023cd51dbe bind-9.7.6_P1-i486-1_slack10.1.tgz
Slackware 10.2 package:
5bcc0624a83bdb6a7624a951df8d9ac1 bind-9.7.6_P1-i486-1_slack10.2.tgz
Slackware 11.0 package:
5f5bef76e32dff698093f4d40aaf9e22 bind-9.7.6_P1-i486-1_slack11.0.tgz
Slackware 12.0 package:
e9cdeb8717363e648008890bde6f1cac bind-9.7.6_P1-i486-1_slack12.0.tgz
Slackware 12.1 package:
cdcadbc6cae03b16e39a222f24e3786b bind-9.7.6_P1-i486-1_slack12.1.tgz
Slackware 12.2 package:
77ce739695fd60507628410bb629df7a bind-9.7.6_P1-i486-1_slack12.2.tgz
Slackware 13.0 package:
52eb3c84976d1047dc82b0a7d306a59e bind-9.7.6_P1-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
dfebcdf94ff058fe5a78cd41bedddc4f bind-9.7.6_P1-x86_64-1_slack13.0.txz
Slackware 13.1 package:
f15ec3e442c950c0c0ab9a63b80a1f26 bind-9.7.6_P1-i486-1_slack13.1.txz
Slackware x86_64 13.1 package:
47f1ed3d833c223ad29331d6d38535b7 bind-9.7.6_P1-x86_64-1_slack13.1.txz
Slackware 13.37 package:
f6c28f56889b14020b2c3d034a3ea889 bind-9.7.6_P1-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
6d177613e029056f533c2f4abddbfb0d bind-9.7.6_P1-x86_64-1_slack13.37.txz
Slackware -current package:
04a8c4613863017b632c92b93732834c n/bind-9.9.1_P1-i486-1.txz
Slackware x86_64 -current package:
8abe838febee6d569e52d7b2e7812cc8 n/bind-9.9.1_P1-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.7.6_P1-i486-1_slack13.37.txz
Ensure that the configuration files are compatible with the upgraded
version of BIND, and then restart the nameserver:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk/ZfWgACgkQakRjwEAQIjMiCACdEOdS5qBXmIzaw6u3BxqAE+Fh
GMAAnR3+TRdJSL1y0xku9LMb4S+EBpZt
=8liY
-----END PGP SIGNATURE-----
|
| |