In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/08/18/3 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/08/20/2 | Mailing List Patch Third Party Advisory |
https://kb.isc.org/v1/docs/cve-2021-25218 | Exploit Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ | |
https://security.netapp.com/advisory/ntap-20210909-0002/ | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-08-18 19:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-25218
Mitre link : CVE-2021-25218
CVE.ORG link : CVE-2021-25218
JSON object : View
Products Affected
fedoraproject
- fedora
isc
- bind
CWE
CWE-617
Reachable Assertion