ELSA-2021-3325

ELSA-2021-3325 - bind security update

Type:SECURITY
Severity:MODERATE
Release Date:2021-09-01

Description


[32:9.11.4-26.P2.7]
- Apply again patch 172, got removed by mistake

[32:9.11.4-26.P2.6]
- Insufficient IXFR checks could lead to assertion failure (CVE-2021-25214)


Related CVEs


CVE-2021-25214

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) bind-9.11.4-26.P2.el7_9.7.src.rpm6b5b1e4287a19515be3ef41f6f65b002-
bind-9.11.4-26.P2.el7_9.7.aarch64.rpm14306c3731c99083fa23ef65f4bc3818-
bind-chroot-9.11.4-26.P2.el7_9.7.aarch64.rpm926da66afe7a92877c6d2bda2fcc8487-
bind-devel-9.11.4-26.P2.el7_9.7.aarch64.rpm0cdb55baef4551e9bb46530153993cc0-
bind-export-devel-9.11.4-26.P2.el7_9.7.aarch64.rpm14eb8a2f34209363d0e210e23656bbe9-
bind-export-libs-9.11.4-26.P2.el7_9.7.aarch64.rpmfb8ba085435b151832905d303c16f486-
bind-libs-9.11.4-26.P2.el7_9.7.aarch64.rpm9883edd414c213b1407d3c14d5d80f5e-
bind-libs-lite-9.11.4-26.P2.el7_9.7.aarch64.rpm805e873da6624a2fcefff397e185107b-
bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm5f31696e0e61b3f3385c18e988d58cd4-
bind-lite-devel-9.11.4-26.P2.el7_9.7.aarch64.rpm1d141b19bd64dbf9f7a889548f36882a-
bind-pkcs11-9.11.4-26.P2.el7_9.7.aarch64.rpm3958697ae287a446a1c082b596dc0496-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.aarch64.rpm274e879112626b8357402e9a0523fe35-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.aarch64.rpm340df121303216584187b4c6f928c7a7-
bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.aarch64.rpm55ce0d5c33bdb80f8673b9b9f2fb024e-
bind-sdb-9.11.4-26.P2.el7_9.7.aarch64.rpm175bdfb1785f2b2d0956ac931a142674-
bind-sdb-chroot-9.11.4-26.P2.el7_9.7.aarch64.rpmed7bcf964ab71f42248a78c70b6d081b-
bind-utils-9.11.4-26.P2.el7_9.7.aarch64.rpm06a168a982f5af075b650752bde6f934-
Oracle Linux 7 (x86_64) bind-9.11.4-26.P2.el7_9.7.src.rpm6b5b1e4287a19515be3ef41f6f65b002-
bind-9.11.4-26.P2.el7_9.7.x86_64.rpm87dd8c7790dcd5b44c39e79b8d7c1bc6-
bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm980f77630b5ee2d6d8e751de4f8d67b9-
bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm6f3aada62a1b83aa82586484aa91925b-
bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpme9ed08d019afb612187e86b23a6c1ed8-
bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm1e33c3a85bd070664a8d5cecd1493e77-
bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm9d00765d477911ce994ed88e569e347f-
bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm08a40d1c99532dfe180bd07425446a52-
bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpma67e62c3a24bad6d164a62b60e4c0681-
bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm8ea5232949cff931aefd99067570f741-
bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpmcb6ccc8a771409fa568f77cce04b60e9-
bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm7dd252d6fd590c877b727c35d706202f-
bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpmb702cb3f7e15aec99e7c5ef3e9fa1c80-
bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm5f31696e0e61b3f3385c18e988d58cd4-
bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm47383c928c96572def36798bc6b8e89c-
bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm16dfb0649d9b7becc2532585f410e0ec-
bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm19545105a5a356bd841a01608d3d7399-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpmd70ad008e52836d5755bd1f845a72615-
bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm3d5d3495fd08f919a7f9c1b71da694ea-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm3a97eae041336285e995c8a91688825f-
bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm77591cdafe993addd5374ff49f7692da-
bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm8ebecb08ca6e63740d1d2cec88999b08-
bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpmf470b454d24bc7b7a927be5bf5b96a0e-
bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm13cfa41d9ad6e31247d557d3b97d749e-
bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm49b4bedeac014f81b8690907c8566b0a-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete