First published: Tue Nov 15 2022(Updated: )
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.<br>Security Fix(es):<br><li> bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)</li> <li> bind: DoS from specifically crafted TCP packets (CVE-2022-0396)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-chroot | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debugsource | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-doc | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-license | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/python3-bind | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-chroot | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debugsource | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-chroot | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-debugsource | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-libs-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-utils-debuginfo | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-chroot | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-debuginfo | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-debugsource | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-dnssec-utils | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-dnssec-utils-debuginfo | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-libs | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-libs-debuginfo | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-utils | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-utils-debuginfo | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
redhat/bind-devel | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-devel | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-doc | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-devel | <9.16.23-5.el9_1 | 9.16.23-5.el9_1 |
redhat/bind-devel | <9.16.23-5.el9_1.aa | 9.16.23-5.el9_1.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.