Slackware 1133 Published by

A bind security update has been released for Slackware Linux 14.0, 14.1, 14.2, and -current.





bind (SSA:2021-300-01)

New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.36-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and the following security issue:
The "lame-ttl" option is now forcibly set to 0. This effectively disables the lame server cache, as it could previously be abused by an attacker to significantly degrade resolver performance.
For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219 (* Security fix *)
+--------------------------+

Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab ( http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.36-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.36-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.36-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.36-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.36-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.36-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.22-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.22-x86_64-1.txz

MD5 signatures:
+-------------+

Slackware 14.0 package:
955139c6c3c34b2767adbc54a93de226 bind-9.11.36-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4c78947768d419c9690e90e40b2719a6 bind-9.11.36-x86_64-1_slack14.0.txz

Slackware 14.1 package:
96d5de40298ae8c366b1282bb5d5cde0 bind-9.11.36-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
d9fd555c6b421dde1c0d9b5ab4f6ff74 bind-9.11.36-x86_64-1_slack14.1.txz

Slackware 14.2 package:
bc44771cafcac6ca49d845cc0df03de2 bind-9.11.36-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
4dd25f00abe0ff5b509beb42782ffd75 bind-9.11.36-x86_64-1_slack14.2.txz

Slackware -current package:
e31b1aaea8bd30ac6f6ec84f1b6462a3 n/bind-9.16.22-i586-1.txz

Slackware x86_64 -current package:
f94f3aa80abdcab4a764a43b3c299648 n/bind-9.16.22-x86_64-1.txz

Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg bind-9.11.36-i586-1_slack14.2.txz

Then, restart the name server:

# /etc/rc.d/rc.bind restart