First published: Wed Apr 28 2021(Updated: )
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | <=1:9.11.5.P4+dfsg-5.1+deb10u3<=1:9.11.5.P4+dfsg-5.1<=1:9.16.13-1 | 1:9.11.5.P4+dfsg-5.1+deb10u5 1:9.16.15-1 |
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
BIND 9 | >=9.0.0<9.11.31 | |
BIND 9 | >=9.12.0<9.16.15 | |
BIND 9 | >=9.17.0<9.17.12 | |
BIND 9 | =9.9.3-s1 | |
BIND 9 | =9.9.12-s1 | |
BIND 9 | =9.9.13-s1 | |
BIND 9 | =9.10.5-s1 | |
BIND 9 | =9.10.7-s1 | |
BIND 9 | =9.11.3-s1 | |
BIND 9 | =9.11.5-s3 | |
BIND 9 | =9.11.5-s5 | |
BIND 9 | =9.11.5-s6 | |
BIND 9 | =9.11.6-s1 | |
BIND 9 | =9.11.7-s1 | |
BIND 9 | =9.11.8-s1 | |
BIND 9 | =9.11.12-s1 | |
BIND 9 | =9.11.21-s1 | |
BIND 9 | =9.11.27-s1 | |
BIND 9 | =9.11.29-s1 | |
BIND 9 | =9.16.8-s1 | |
BIND 9 | =9.16.11-s1 | |
BIND 9 | =9.16.13-s1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
netapp cloud backup | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp a250 firmware | ||
netapp a250 | ||
netapp 500f firmware | ||
netapp 500f | ||
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
siemens sinec infrastructure network services | <1.0.1.1 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.31 BIND 9.16.15 BIND 9.17.12 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.31-S1 BIND 9.16.15-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this ISC BIND vulnerability is CVE-2021-25215.
CVE-2021-25215 has a severity level of high.
Versions 9.0.0 to 9.11.29, 9.12.0 to 9.16.13, 9.9.3-S1 to 9.11.29-S1, 9.16.8-S1 to 9.16.13-S1, and 9.17.0 to 9.17.11 of BIND are affected by CVE-2021-25215.
To fix the CVE-2021-25215 vulnerability, upgrade to BIND version 9.11.5.P4+dfsg-5.1+deb10u7, 9.11.5.P4+dfsg-5.1+deb10u9, 9.16.44-1~deb11u1, 9.18.19-1~deb12u1, or 9.19.17-1.
Yes, you can check the following references for more information about CVE-2021-25215: [1](http://www.openwall.com/lists/oss-security/2021/04/29/1), [2](http://www.openwall.com/lists/oss-security/2021/04/29/2), [3](http://www.openwall.com/lists/oss-security/2021/04/29/3).