|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2021:1469-1)|
|Summary:||The remote host is missing an update for the 'bind' package(s) announced via the SUSE-SU-2021:1469-1 advisory.|
The remote host is missing an update for the 'bind' package(s) announced via the SUSE-SU-2021:1469-1 advisory.
This update for bind fixes the following issues:
CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR)
which could have caused named to terminate unexpectedly (bsc#1185345).
CVE-2021-25215: Fixed an assertion check which could have failed while
answering queries for DNAME records that required the DNAME to be
processed to resolve itself (bsc#1185345).
CVE-2021-25216: Fixed an issue where policy negotiation can be targeted
by a buffer overflow attack (bsc#1185345).
MD5 warning message using host, dig, nslookup (bind-utils) with FIPS
'bind' package(s) on SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud 8, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server 12-SP3, SUSE Linux Enterprise Server 12-SP2, HPE Helion Openstack 8
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2021-25214|
Common Vulnerability Exposure (CVE) ID: CVE-2021-25215
Common Vulnerability Exposure (CVE) ID: CVE-2021-25216
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.