Bind Package Update for Slackware Linux 15.0
New bind packages have been released for Slackware Linux 15.0 to address a critical security vulnerability identified as CVE-2025-40777. The update includes the following details:
- Version: bind-9.18.38 for Slackware 15.0
- Fix: This update resolves a potential assertion failure that occurs when the 'stale-answer-client-timeout 0' option is utilized.
For further technical details, users can refer to the ISC Knowledge Base and the CVE record linked below:
- [ISC Knowledge Base](https://kb.isc.org/docs/cve-2025-40777)
- [CVE Record](https://www.cve.org/CVERecord?id=CVE-2025-40777)
Package Availability:
The updated bind packages can be downloaded from the following links:
- For Slackware 15.0 (32-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/bind-9.18.38-i586-1_slack15.0.txz)
- For Slackware 15.0 (64-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/bind-9.18.38-x86_64-1_slack15.0.txz)
- For Slackware -current (32-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.20.11-i686-1.txz)
- For Slackware -current (64-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.20.11-x86_64-1.txz)
MD5 Checksums:
To verify the integrity of the packages, the following MD5 signatures are provided:
- Slackware 15.0 (32-bit): `6840881bd06b47e49675de2eac1e9f7a`
- Slackware 15.0 (64-bit): `2aabd9caab0cf97636d1a9bb5339f601`
- Slackware -current (32-bit): `5f4727b6f552772a6766d59b87bdd812`
- Slackware -current (64-bit): `ccd6e6929daf1a56bdf66b5f632db6a6`
Installation Instructions:
To upgrade to the new package, users should execute the following commands as root:
1. Upgrade the package:
Acknowledgments:
The Slackware project expresses gratitude to the OSU Open Source Lab for their support in providing FTP and rsync hosting services.
For more information about Slackware and additional resources, users can visit [Slackware Official Website](http://slackware.com).
Future Updates:
It is advisable for Slackware users to regularly check for updates and security advisories to ensure their systems remain secure and up-to-date. The Slackware Linux Security Team is dedicated to providing timely updates and support for all users
New bind packages have been released for Slackware Linux 15.0 to address a critical security vulnerability identified as CVE-2025-40777. The update includes the following details:
- Version: bind-9.18.38 for Slackware 15.0
- Fix: This update resolves a potential assertion failure that occurs when the 'stale-answer-client-timeout 0' option is utilized.
For further technical details, users can refer to the ISC Knowledge Base and the CVE record linked below:
- [ISC Knowledge Base](https://kb.isc.org/docs/cve-2025-40777)
- [CVE Record](https://www.cve.org/CVERecord?id=CVE-2025-40777)
Package Availability:
The updated bind packages can be downloaded from the following links:
- For Slackware 15.0 (32-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/bind-9.18.38-i586-1_slack15.0.txz)
- For Slackware 15.0 (64-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/bind-9.18.38-x86_64-1_slack15.0.txz)
- For Slackware -current (32-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.20.11-i686-1.txz)
- For Slackware -current (64-bit): [Download Link](ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.20.11-x86_64-1.txz)
MD5 Checksums:
To verify the integrity of the packages, the following MD5 signatures are provided:
- Slackware 15.0 (32-bit): `6840881bd06b47e49675de2eac1e9f7a`
- Slackware 15.0 (64-bit): `2aabd9caab0cf97636d1a9bb5339f601`
- Slackware -current (32-bit): `5f4727b6f552772a6766d59b87bdd812`
- Slackware -current (64-bit): `ccd6e6929daf1a56bdf66b5f632db6a6`
Installation Instructions:
To upgrade to the new package, users should execute the following commands as root:
1. Upgrade the package:
2. Restart the name server to apply changes:upgradepkg bind-9.18.38-i586-1_slack15.0.txz
/etc/rc.d/rc.bind restart
Acknowledgments:
The Slackware project expresses gratitude to the OSU Open Source Lab for their support in providing FTP and rsync hosting services.
For more information about Slackware and additional resources, users can visit [Slackware Official Website](http://slackware.com).
Future Updates:
It is advisable for Slackware users to regularly check for updates and security advisories to ensure their systems remain secure and up-to-date. The Slackware Linux Security Team is dedicated to providing timely updates and support for all users
Bind for Slackware
New bind packages have been released for Slackware Linux 15.0 to address a security issue:
bind (SSA:2025-197-01)