Lucene search

K
slackwareSlackware Linux ProjectSSA-2021-300-01
HistoryOct 28, 2021 - 1:13 a.m.

[slackware-security] bind

2021-10-2801:13:50
Slackware Linux Project
www.slackware.com
17

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

71.2%

New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/bind-9.11.36-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and the following security issue:
The “lame-ttl” option is now forcibly set to 0. This effectively disables
the lame server cache, as it could previously be abused by an attacker to
significantly degrade resolver performance.
For more information, see:
https://vulners.com/cve/CVE-2021-25219
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.36-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.36-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.36-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.36-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.36-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.36-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.16.22-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.16.22-x86_64-1.txz

MD5 signatures:

Slackware 14.0 package:
955139c6c3c34b2767adbc54a93de226 bind-9.11.36-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4c78947768d419c9690e90e40b2719a6 bind-9.11.36-x86_64-1_slack14.0.txz

Slackware 14.1 package:
96d5de40298ae8c366b1282bb5d5cde0 bind-9.11.36-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
d9fd555c6b421dde1c0d9b5ab4f6ff74 bind-9.11.36-x86_64-1_slack14.1.txz

Slackware 14.2 package:
bc44771cafcac6ca49d845cc0df03de2 bind-9.11.36-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
4dd25f00abe0ff5b509beb42782ffd75 bind-9.11.36-x86_64-1_slack14.2.txz

Slackware -current package:
e31b1aaea8bd30ac6f6ec84f1b6462a3 n/bind-9.16.22-i586-1.txz

Slackware x86_64 -current package:
f94f3aa80abdcab4a764a43b3c299648 n/bind-9.16.22-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg bind-9.11.36-i586-1_slack14.2.txz

Then, restart the name server:

> /etc/rc.d/rc.bind restart

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

71.2%