Linux Security
    Linux Security
    Linux Security

    Slackware: 2020-234-01: bind Security Update

    Date
    251
    Posted By
    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    [slackware-security]  bind (SSA:2020-234-01)
    
    New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
    fix security issues.
    
    
    Here are the details from the Slackware 14.2 ChangeLog:
    +--------------------------+
    patches/packages/bind-9.11.22-i586-1_slack14.2.txz:  Upgraded.
      This update fixes three security issues:
      "update-policy" rules of type "subdomain" were incorrectly treated as
      "zonesub" rules, which allowed keys used in "subdomain" rules to update
      names outside of the specified subdomains. The problem was fixed by making
      sure "subdomain" rules are again processed as described in the ARM.
      When BIND 9 was compiled with native PKCS#11 support, it was possible to
      trigger an assertion failure in code determining the number of bits in the
      PKCS#11 RSA public key with a specially crafted packet.
      It was possible to trigger an assertion failure when verifying the response
      to a TSIG-signed request.
      For more information, see:
        https://kb.isc.org/docs/cve-2020-8624
        https://kb.isc.org/docs/cve-2020-8623
        https://kb.isc.org/docs/cve-2020-8622
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
      (* Security fix *)
    +--------------------------+
    
    
    Where to find the new packages:
    +-----------------------------+
    
    Thanks to the friendly folks at the OSU Open Source Lab
    (https://osuosl.org) for donating FTP and rsync hosting
    to the Slackware project!  :-)
    
    Also see the "Get Slack" section on https://slackware.com for
    additional mirror sites near you.
    
    Updated package for Slackware 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.22-i486-1_slack14.0.txz
    
    Updated package for Slackware x86_64 14.0:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.22-x86_64-1_slack14.0.txz
    
    Updated package for Slackware 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.22-i486-1_slack14.1.txz
    
    Updated package for Slackware x86_64 14.1:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.22-x86_64-1_slack14.1.txz
    
    Updated package for Slackware 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.22-i586-1_slack14.2.txz
    
    Updated package for Slackware x86_64 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.22-x86_64-1_slack14.2.txz
    
    Updated package for Slackware -current:
    ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.6-i586-1.txz
    
    Updated package for Slackware x86_64 -current:
    ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.6-x86_64-1.txz
    
    
    MD5 signatures:
    +-------------+
    
    Slackware 14.0 package:
    a12c8c16dc4cd9de5b5d446921ee8f77  bind-9.11.22-i486-1_slack14.0.txz
    
    Slackware x86_64 14.0 package:
    0f5bcbc1aa988d9a4a3ebfb955e295f2  bind-9.11.22-x86_64-1_slack14.0.txz
    
    Slackware 14.1 package:
    791e5cda71254d2f2f0b600114f87752  bind-9.11.22-i486-1_slack14.1.txz
    
    Slackware x86_64 14.1 package:
    bec9a43e8d806ee8f42ca93b166974d6  bind-9.11.22-x86_64-1_slack14.1.txz
    
    Slackware 14.2 package:
    607252a1d76bcb1816ffbf87a9940638  bind-9.11.22-i586-1_slack14.2.txz
    
    Slackware x86_64 14.2 package:
    99b1ac8e64552263bcd8270e925c2607  bind-9.11.22-x86_64-1_slack14.2.txz
    
    Slackware -current package:
    013ec777d7ea2ca00b709872680e25de  n/bind-9.16.6-i586-1.txz
    
    Slackware x86_64 -current package:
    23064658c75461364a4d6db7c54a6994  n/bind-9.16.6-x86_64-1.txz
    
    
    Installation instructions:
    +------------------------+
    
    Upgrade the package as root:
    # upgradepkg bind-9.11.22-i586-1_slack14.2.txz
    
    Then, restart the name server:
    
    # /etc/rc.d/rc.bind restart
    
    
    +-----+
    

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.