Denial of Service in BIND
ID: | SSA:2017-041-01 |
Distribution: | Slackware |
Plattformen: | Slackware -current, Slackware 13.0, Slackware x86_64 13.0, Slackware x86_64 -current, Slackware x86_64 13.1, Slackware 13.1, Slackware x86_64 13.37, Slackware 13.37, Slackware 14.0, Slackware x86_64 14.0, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2 |
Datum: | Sa, 11. Februar 2017, 10:18 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 |
Applikationen: | BIND |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] bind (SSA:2017-041-01) New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz: Upgraded. This update fixes a denial-of-service vulnerability. Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. For more information, see: https://kb.isc.org/article/AA-01453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.9.9_P6-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.9.9_P6-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.9.9_P6-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.9.9_P6-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.9_P6-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.9_P6-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.9.9_P6-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.9.9_P6-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.10.4_P6-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.11.0_P3-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.11.0_P3-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 186dec22b5d77adcb3ecd60d6b88f9f4 bind-9.9.9_P6-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 324ac756fc7537acd16329dd915cf8dd bind-9.9.9_P6-x86_64-1_slack13.0.txz Slackware 13.1 package: 25f1340ac4aca4f84dbda2934baebee5 bind-9.9.9_P6-i486-1_slack13.1.txz Slackware x86_64 13.1 package: c9116a4b4da59c0915f11ded245be630 bind-9.9.9_P6-x86_64-1_slack13.1.txz Slackware 13.37 package: ec66023fdc318d17fd1b5884016d0280 bind-9.9.9_P6-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 0f0d7a0b0b09149821cd3eff076b0d00 bind-9.9.9_P6-x86_64-1_slack13.37.txz Slackware 14.0 package: 53b7d2337bffac26f2954c890839fb35 bind-9.9.9_P6-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 9a05a4e8070e70cfa37d19ab86b61d1b bind-9.9.9_P6-x86_64-1_slack14.0.txz Slackware 14.1 package: 7fd83b334b5eef2af3402f3337671c9d bind-9.9.9_P6-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 231dce9a8d19178aefc44d7f20b7df74 bind-9.9.9_P6-x86_64-1_slack14.1.txz Slackware 14.2 package: 570b3b7b6cbc2fa6d0e412f0d9aa5591 bind-9.10.4_P6-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 3eb8a784f19905d3e9e9e029ace66c00 bind-9.10.4_P6-x86_64-1_slack14.2.txz Slackware -current package: 55c8d651b99c40f2c70f67b16836b90e n/bind-9.11.0_P3-i586-1.txz Slackware x86_64 -current package: 76617f2b30b45237cd3f126af4c6927e n/bind-9.11.0_P3-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg bind-9.10.4_P6-i586-1_slack14.2.txz Then, restart the name server: # /etc/rc.d/rc.bind restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAlieJSYACgkQakRjwEAQIjNv7QCfbnW0ZiP2L4FeHL/uerEFO76I W3gAn3gsePzQt8Nsk08+6cpd3JLnhbmf =LfO4 -----END PGP SIGNATURE----- |