Total vulnerabilities in the database
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
isc / bind | 9.11.7-s1 | 9.11.7-s1.x |
isc / bind | 9.11.3-s1 | 9.11.3-s1.x |
isc / bind | 9.11.6-s1 | 9.11.6-s1.x |
isc / bind | 9.10.5-s1 | 9.10.5-s1.x |
isc / bind | 9.11.5-s5 | 9.11.5-s5.x |
isc / bind | 9.11.5-s3 | 9.11.5-s3.x |
isc / bind | 9.9.3-s1 | 9.9.3-s1.x |
isc / bind | 9.10.7-s1 | 9.10.7-s1.x |
isc / bind | 9.11.5-s6 | 9.11.5-s6.x |
isc / bind | 9.11.12-s1 | 9.11.12-s1.x |
isc / bind | 9.11.8-s1 | 9.11.8-s1.x |
isc / bind | 9.9.12-s1 | 9.9.12-s1.x |
isc / bind | 9.9.13-s1 | 9.9.13-s1.x |
isc / bind | 9.11.21-s1 | 9.11.21-s1.x |
isc / bind | 9.16.8-s1 | 9.16.8-s1.x |
isc / bind | 9.16.11-s1 | 9.16.11-s1.x |
isc / bind | 9.11.27-s1 | 9.11.27-s1.x |
isc / bind | 9.16.13-s1 | 9.16.13-s1.x |
isc / bind | 9.11.29-s1 | 9.11.29-s1.x |
isc / bind | 9.12.0 | 9.16.15 |
isc / bind | 9.17.0 | 9.17.12 |
isc / bind | 9.0.0 | 9.11.31 |
fedoraproject / fedora | 33 | 33.x |
fedoraproject / fedora | 34 | 34.x |
oracle / tekelec_platform_distribution | 7.4.0 | 7.7.1.x |
siemens / sinec_infrastructure_network_services | - | 1.0.1.1 |