Slackware: 2019-116-01: bind Security Update

    Date26 Apr 2019
    CategorySlackware
    617
    Posted ByLinuxSecurity Advisories
    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    [slackware-security]  bind (SSA:2019-116-01)
    
    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
    fix a security issue.
    
    
    Here are the details from the Slackware 14.2 ChangeLog:
    +--------------------------+
    patches/packages/bind-9.11.6_P1-i586-1_slack14.2.txz:  Upgraded.
      This update fixes a security issue:
      The TCP client quota set using the tcp-clients option could be exceeded
      in some cases. This could lead to exhaustion of file descriptors.
      For more information, see:
        https://kb.isc.org/docs/cve-2018-5743
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743
      (* Security fix *)
    +--------------------------+
    
    
    Where to find the new packages:
    +-----------------------------+
    
    Thanks to the friendly folks at the OSU Open Source Lab
    (http://osuosl.org) for donating FTP and rsync hosting
    to the Slackware project!  :-)
    
    Also see the "Get Slack" section on http://slackware.com for
    additional mirror sites near you.
    
    Updated package for Slackware 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.6_P1-i486-1_slack14.0.txz
    
    Updated package for Slackware x86_64 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.0.txz
    
    Updated package for Slackware 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.6_P1-i486-1_slack14.1.txz
    
    Updated package for Slackware x86_64 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.1.txz
    
    Updated package for Slackware 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.6_P1-i586-1_slack14.2.txz
    
    Updated package for Slackware x86_64 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.2.txz
    
    Updated package for Slackware -current:
    ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.14.1-i586-1.txz
    
    Updated package for Slackware x86_64 -current:
    ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.14.1-x86_64-1.txz
    
    
    MD5 signatures:
    +-------------+
    
    Slackware 14.0 package:
    d6835a3a22d339df9ca0afd5ab8561bc  bind-9.11.6_P1-i486-1_slack14.0.txz
    
    Slackware x86_64 14.0 package:
    892265f47674a12362bf821dab2cc9fa  bind-9.11.6_P1-x86_64-1_slack14.0.txz
    
    Slackware 14.1 package:
    4c55681ae3fb61df7d1af3c92fc53db5  bind-9.11.6_P1-i486-1_slack14.1.txz
    
    Slackware x86_64 14.1 package:
    932435bf42a652149c5d7a68267696f1  bind-9.11.6_P1-x86_64-1_slack14.1.txz
    
    Slackware 14.2 package:
    65779b9f25e221aa3bb1726e331218d4  bind-9.11.6_P1-i586-1_slack14.2.txz
    
    Slackware x86_64 14.2 package:
    a6b8c6ea2b4abd53b9cb21a77ffc93b7  bind-9.11.6_P1-x86_64-1_slack14.2.txz
    
    Slackware -current package:
    c1f720dd751a405a60b8e6b59dcb3279  n/bind-9.14.1-i586-1.txz
    
    Slackware x86_64 -current package:
    65a617602a5e83d626d1a7045f346cf4  n/bind-9.14.1-x86_64-1.txz
    
    
    Installation instructions:
    +------------------------+
    
    Upgrade the package as root:
    # upgradepkg bind-9.11.6_P1-i586-1_slack14.2.txz
    
    Then, restart the name server:
    
    # /etc/rc.d/rc.bind restart
    
    
    +-----+
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.