Home / mailingsPDF  

[slackware-security] bind (SSA:2021-300-01)

Posted on 28 October 2021
Slackware Security

[slackware-security] bind (SSA:2021-300-01)

New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix a security issue.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.36-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and the following security issue:
The "lame-ttl" option is now forcibly set to 0. This effectively disables
the lame server cache, as it could previously be abused by an attacker to
significantly degrade resolver performance.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.36-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.36-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.36-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.36-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.36-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.36-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.22-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.22-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
955139c6c3c34b2767adbc54a93de226 bind-9.11.36-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4c78947768d419c9690e90e40b2719a6 bind-9.11.36-x86_64-1_slack14.0.txz

Slackware 14.1 package:
96d5de40298ae8c366b1282bb5d5cde0 bind-9.11.36-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
d9fd555c6b421dde1c0d9b5ab4f6ff74 bind-9.11.36-x86_64-1_slack14.1.txz

Slackware 14.2 package:
bc44771cafcac6ca49d845cc0df03de2 bind-9.11.36-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
4dd25f00abe0ff5b509beb42782ffd75 bind-9.11.36-x86_64-1_slack14.2.txz

Slackware -current package:
e31b1aaea8bd30ac6f6ec84f1b6462a3 n/bind-9.16.22-i586-1.txz

Slackware x86_64 -current package:
f94f3aa80abdcab4a764a43b3c299648 n/bind-9.16.22-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg bind-9.11.36-i586-1_slack14.2.txz

Then, restart the name server:

# /etc/rc.d/rc.bind restart


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

 

TOP