CVE-2021-25218

In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:9.16.19:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:9.17.16:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:9.17.16:s1:*:*:supported_preview:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

07 Nov 2023, 03:31

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/', 'name': 'FEDORA-2021-fbb258debf', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ -

16 Sep 2021, 12:30

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210909-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210909-0002/ - Third Party Advisory

09 Sep 2021, 09:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210909-0002/ -

27 Aug 2021, 20:12

Type Values Removed Values Added
CWE CWE-617
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/08/20/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/08/20/2 - Mailing List, Patch, Third Party Advisory
References (CONFIRM) https://kb.isc.org/v1/docs/cve-2021-25218 - (CONFIRM) https://kb.isc.org/v1/docs/cve-2021-25218 - Exploit, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/08/18/3 - (MLIST) http://www.openwall.com/lists/oss-security/2021/08/18/3 - Mailing List, Patch, Third Party Advisory
CPE cpe:2.3:a:isc:bind:9.16.19:*:*:*:-:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.17.16:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.17.16:*:*:*:-:*:*:*

21 Aug 2021, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/08/20/2 -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/08/18/3 -

18 Aug 2021, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-18 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-25218

Mitre link : CVE-2021-25218

CVE.ORG link : CVE-2021-25218


JSON object : View

Products Affected

fedoraproject

  • fedora

isc

  • bind
CWE
CWE-617

Reachable Assertion