Количество 18
Количество 18

CVE-2021-25215
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

CVE-2021-25215
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

CVE-2021-25215
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

CVE-2021-25215
CVE-2021-25215
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S ...

RLSA-2021:1989
Important: bind security update
GHSA-r4mp-379r-9756
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
ELSA-2021-9213
ELSA-2021-9213: bind security update (IMPORTANT)
ELSA-2021-1989
ELSA-2021-1989: bind security update (IMPORTANT)
ELSA-2021-1469
ELSA-2021-1469: bind security update (IMPORTANT)

BDU:2021-02778
Уязвимость компонента named сервера DNS BIND, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2021:1826-1
Security update for bind

openSUSE-SU-2021:0668-1
Security update for bind

SUSE-SU-2021:1826-1
Security update for bind

SUSE-SU-2021:1471-1
Security update for bind

SUSE-SU-2021:1468-1
Security update for bind

SUSE-SU-2021:14714-1
Security update for bind

SUSE-SU-2021:1469-1
Security update for bind
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-25215 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. | CVSS3: 7.5 | 2% Низкий | около 4 лет назад |
![]() | CVE-2021-25215 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. | CVSS3: 7.5 | 2% Низкий | около 4 лет назад |
![]() | CVE-2021-25215 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. | CVSS3: 7.5 | 2% Низкий | около 4 лет назад |
![]() | CVSS3: 7.5 | 2% Низкий | около 4 лет назад | |
CVE-2021-25215 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S ... | CVSS3: 7.5 | 2% Низкий | около 4 лет назад | |
![]() | RLSA-2021:1989 Important: bind security update | 2% Низкий | почти 4 года назад | |
GHSA-r4mp-379r-9756 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. | CVSS3: 7.5 | 2% Низкий | около 3 лет назад | |
ELSA-2021-9213 ELSA-2021-9213: bind security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-1989 ELSA-2021-1989: bind security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-1469 ELSA-2021-1469: bind security update (IMPORTANT) | около 4 лет назад | |||
![]() | BDU:2021-02778 Уязвимость компонента named сервера DNS BIND, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.3 | 2% Низкий | около 4 лет назад |
![]() | openSUSE-SU-2021:1826-1 Security update for bind | почти 4 года назад | ||
![]() | openSUSE-SU-2021:0668-1 Security update for bind | около 4 лет назад | ||
![]() | SUSE-SU-2021:1826-1 Security update for bind | около 4 лет назад | ||
![]() | SUSE-SU-2021:1471-1 Security update for bind | около 4 лет назад | ||
![]() | SUSE-SU-2021:1468-1 Security update for bind | около 4 лет назад | ||
![]() | SUSE-SU-2021:14714-1 Security update for bind | около 4 лет назад | ||
![]() | SUSE-SU-2021:1469-1 Security update for bind | около 4 лет назад |
Уязвимостей на страницу