New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, and -current to address a security problem.
More details may be found at the following links:
http://www.isc.org/sw/bind/bind-security.php
http://www.kb.cert.org/vuls/id/800113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
Here are the details from the Slackware 12.1 ChangeLog:
+--------------------------+
patches/packages/bind-9.4.2_P1-i486-1_slack12.1.tgz:
Upgraded to bind-9.4.2-P1.
This upgrade addresses a security flaw known as the CERT VU#800113 DNS Cache
Poisoning Issue. This is the summary of the problem from the BIND site:
"A weakness in the DNS protocol may enable the poisoning of caching
recurive resolvers with spoofed data. DNSSEC is the only full solution.
New versions of BIND provide increased resilience to the attack."
It is suggested that sites that run BIND upgrade to one of the new packages
in order to reduce their exposure to DNS cache poisoning attacks.
For more information, see:
http://www.isc.org/sw/bind/bind-security.php
http://www.kb.cert.org/vuls/id/800113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/bind-9.3.5_P1-i386-1_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/bind-9.3.5_P1-i386-1_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/bind-9.3.5_P1-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/bind-9.3.5_P1-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/bind-9.3.5_P1-i486-1_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/bind-9.3.5_P1-i486-1_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/bind-9.3.5_P1-i486-1_slack11.0.tgz
Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/bind-9.4.2_P1-i486-1_slack12.0.tgz
Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/bind-9.4.2_P1-i486-1_slack12.1.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.4.2_P1-i486-1.tgz
MD5 signatures:
+-------------+
Slackware 8.1 package:
c693e1ae4997c7cc23c0051ec1c90796 bind-9.3.5_P1-i386-1_slack8.1.tgz
Slackware 9.0 package:
24326f563c6588a0541f3409bc7298cd bind-9.3.5_P1-i386-1_slack9.0.tgz
Slackware 9.1 package:
67178dd97006cf4cf3543704c82741b8 bind-9.3.5_P1-i486-1_slack9.1.tgz
Slackware 10.0 package:
a12c9e8304c5a7e285fa4df7d4b9756b bind-9.3.5_P1-i486-1_slack10.0.tgz
Slackware 10.1 package:
6209e4a5f9693451279b0d02795b9bd8 bind-9.3.5_P1-i486-1_slack10.1.tgz
Slackware 10.2 package:
e1c6d74c787fa3b7f3a5905fef206206 bind-9.3.5_P1-i486-1_slack10.2.tgz
Slackware 11.0 package:
d354a0118388bb0f3fd32fa79166746a bind-9.3.5_P1-i486-1_slack11.0.tgz
Slackware 12.0 package:
5b1087e6a0dc79ebf06144f44d5bb52f bind-9.4.2_P1-i486-1_slack12.0.tgz
Slackware 12.1 package:
da76550505d62f0d902b710a078d1020 bind-9.4.2_P1-i486-1_slack12.1.tgz
Slackware -current package:
c255530e46f4cff8080a20b6c8d12443 bind-9.4.2_P1-i486-1.tgz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.4.2_P1-i486-1_slack12.1.tgz
Then, restart the nameserver:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
Crytek: No More Crysis Patches
Massive Patch Coming for DNS Vulnerability
samba (SSA:2008-149-01)
This entry was posted
on 11:11 PM
.
Archives
-
▼
2008
(457)
-
▼
July
(63)
- Ubuntu 8.10 Alpha 3 released
- DSA 1616-2: New clamav packages fix denial of service
- GNOME Commander 1.2.7 released
- USN-629-1: Thunderbird vulnerabilities
- Debian GNU/Linux 4.0r4
- DSA 1619-1: New python-dns packages fix DNS respon...
- RHSA-2008:0665-01 Moderate: Updated kernel package...
- DSA 1620-1: New python2.5 packages fix several vul...
- DSA 1616-1: new clamav packages fix denial of service
- RHSA-2008:0575-01 Moderate: rdesktop security update
- RHSA-2008:0576-01 Moderate: rdesktop security update
- RHSA-2008:0616-01 Moderate: thunderbird security u...
- DSA 1614-1: New iceweasel packages fix several vul...
- dnsmasq (SSA:2008-205-01)
- RHSA-2008:0607-01 Important: kernel security and b...
- RHSA-2008:0582-01 Moderate: php security update
- GLSA 200807-11 PeerCast: Buffer overflow
- DSA 1612-1: New ruby1.8 packages fix several vulne...
- Installing And Using OpenVZ On Fedora 9
- Fedora Unity releases updated Fedora 9 Re-Spin
- RHSA-2008:0599-01 Critical: seamonkey security update
- RHSA-2008:0546-01 Moderate: php security update
- DSA 1611-1: New afuse packages fix privilege escal...
- USN-623-1: Firefox vulnerabilities
- Linux 2.6.26 Kernel Benchmarks
- CESA-2008:0545 Moderate CentOS 4 ia64 php - securi...
- RHSA-2008:0597-01 Critical: firefox security update
- RHSA-2008:0545-01 Moderate: php security and bug f...
- GNOME 3.0 officially announced... and explained
- RHSA-2008:0555-01 Critical: java-1.4.2-ibm securit...
- USN-624-1: PCRE vulnerability
- RHSA-2008:0581-01 Moderate: bluez-libs and bluez-u...
- CESA-2008:0583 Important CentOS 4 i386 openldap - ...
- Ubuntu 8.10 Alpha 2 Screenshot Tour
- CESA-2008:0583 Important CentOS 5 x86_64 openldap ...
- Mandriva Linux 2009 Alpha 2
- CESA-2008:0584 Important CentOS 5 x86_64 pidgin Up...
- DSA 1607-1: New iceweasel packages fix several vul...
- CESA-2008:0583 Important CentOS 4 s390(x) openldap...
- bind (SSA:2008-191-02)
- CESA-2008:0584 Important CentOS 5 i386 pidgin Update
- CESA-2008:0583 Important CentOS 5 i386 openldap Up...
- RHSA-2008:0584-01 Important: pidgin security and b...
- RHSA-2008:0533-01 Important: bind security update
- CEBA-2008:0557 CentOS 5 x86_64 nspr Update
- DSA 1602-1: New pcre3 packages fix arbitrary code ...
- Ubuntu 8.04.1 LTS released
- Bordeaux 1.2 Released with Cellars support
- CESA-2008:0547 Critical CentOS 4 s390(x) seamonkey...
- ATI Radeon HD 4870 On Linux
- RHSA-2008:0505-01 Moderate: Red Hat Application St...
- CESA-2008:0547-01: Critical CentOS 2 i386 seamonke...
- RHSA-2008:0549-01 Critical: firefox security update
- GLSA 200807-01 Python: Multiple integer overflows
- CESA-2008:0521-03: Low CentOS 2 i386 end of life n...
- RHSA-2008:0569-01 Critical: firefox security update
- gnutls (SSA:2008-180-01)
- USN-617-2: Samba regression
- CESA-2008:0556 Important CentOS 4 s390(x) freetype...
- Ubuntu Linux 8.10 Alpha 1
- Mass-market WiFi router invites Linux hackers
- Run Linux in Windows
- CESA-2008:0556 Important CentOS 3 s390(x) freetype...
-
▼
July
(63)