Linux Security
    Linux Security
    Linux Security

    Slackware: 2020-106-01: bind Security Update

    Date
    161
    Posted By

    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    [slackware-security]  bind (SSA:2020-106-01)
    
    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
    fix security issues.
    
    
    Here are the details from the Slackware 14.2 ChangeLog:
    +--------------------------+
    patches/packages/bind-9.11.18-i586-1_slack14.2.txz:  Upgraded.
      This update fixes a security issue:
      DNS rebinding protection was ineffective when BIND 9 is configured as a
      forwarding DNS server. Found and responsibly reported by Tobias Klein.
      [GL #1574]
      (* Security fix *)
    +--------------------------+
    
    
    Where to find the new packages:
    +-----------------------------+
    
    Thanks to the friendly folks at the OSU Open Source Lab
    (https://osuosl.org) for donating FTP and rsync hosting
    to the Slackware project!  :-)
    
    Also see the "Get Slack" section on https://slackware.com for
    additional mirror sites near you.
    
    Updated package for Slackware 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.18-i486-1_slack14.0.txz
    
    Updated package for Slackware x86_64 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.18-x86_64-1_slack14.0.txz
    
    Updated package for Slackware 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.18-i486-1_slack14.1.txz
    
    Updated package for Slackware x86_64 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.18-x86_64-1_slack14.1.txz
    
    Updated package for Slackware 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.18-i586-1_slack14.2.txz
    
    Updated package for Slackware x86_64 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.18-x86_64-1_slack14.2.txz
    
    Updated package for Slackware -current:
    ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.2-i586-1.txz
    
    Updated package for Slackware x86_64 -current:
    ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.2-x86_64-1.txz
    
    
    MD5 signatures:
    +-------------+
    
    Slackware 14.0 package:
    f62dd2a32c11271dfba0d09f1ee668b2  bind-9.11.18-i486-1_slack14.0.txz
    
    Slackware x86_64 14.0 package:
    20b0637590e88c500953203c6b5d9d9f  bind-9.11.18-x86_64-1_slack14.0.txz
    
    Slackware 14.1 package:
    1a246c07fb78859ea6eb91b504128e89  bind-9.11.18-i486-1_slack14.1.txz
    
    Slackware x86_64 14.1 package:
    7d6a07533692bfe65c5bd864035c59cc  bind-9.11.18-x86_64-1_slack14.1.txz
    
    Slackware 14.2 package:
    8ebf7c4350c926df96c65632e8b48b3b  bind-9.11.18-i586-1_slack14.2.txz
    
    Slackware x86_64 14.2 package:
    fceb46faf6a6ded54ae922e15ff980a3  bind-9.11.18-x86_64-1_slack14.2.txz
    
    Slackware -current package:
    a5fca3ab2b7e856a48ba922dccc9acdb  n/bind-9.16.2-i586-1.txz
    
    Slackware x86_64 -current package:
    299639862682750736a7a06d65fd4055  n/bind-9.16.2-x86_64-1.txz
    
    
    Installation instructions:
    +------------------------+
    
    Upgrade the package as root:
    # upgradepkg bind-9.11.18-i586-1_slack14.2.txz
    
    Then, restart the name server:
    
    # /etc/rc.d/rc.bind restart
    
    
    +-----+
    

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.