CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
92.9%
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
Bug Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | noarch | python3-bind | < 9.16.23-18.el9_4.1 | python3-bind-9.16.23-18.el9_4.1.noarch.rpm |
almalinux | 9 | i686 | bind-libs | < 9.16.23-18.el9_4.1 | bind-libs-9.16.23-18.el9_4.1.i686.rpm |
almalinux | 9 | noarch | bind-license | < 9.16.23-18.el9_4.1 | bind-license-9.16.23-18.el9_4.1.noarch.rpm |
almalinux | 9 | noarch | bind-dnssec-doc | < 9.16.23-18.el9_4.1 | bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm |
almalinux | 9 | aarch64 | bind-libs | < 9.16.23-18.el9_4.1 | bind-libs-9.16.23-18.el9_4.1.aarch64.rpm |
almalinux | 9 | aarch64 | bind | < 9.16.23-18.el9_4.1 | bind-9.16.23-18.el9_4.1.aarch64.rpm |
almalinux | 9 | aarch64 | bind-dyndb-ldap | < 11.9-9.el9_4.alma.1 | bind-dyndb-ldap-11.9-9.el9_4.alma.1.aarch64.rpm |
almalinux | 9 | aarch64 | bind-utils | < 9.16.23-18.el9_4.1 | bind-utils-9.16.23-18.el9_4.1.aarch64.rpm |
almalinux | 9 | aarch64 | bind-dnssec-utils | < 9.16.23-18.el9_4.1 | bind-dnssec-utils-9.16.23-18.el9_4.1.aarch64.rpm |
almalinux | 9 | aarch64 | bind-chroot | < 9.16.23-18.el9_4.1 | bind-chroot-9.16.23-18.el9_4.1.aarch64.rpm |
access.redhat.com/errata/RHSA-2024:2551
access.redhat.com/security/cve/CVE-2023-4408
access.redhat.com/security/cve/CVE-2023-50387
access.redhat.com/security/cve/CVE-2023-50868
access.redhat.com/security/cve/CVE-2023-5517
access.redhat.com/security/cve/CVE-2023-5679
access.redhat.com/security/cve/CVE-2023-6516
bugzilla.redhat.com/2263896
bugzilla.redhat.com/2263897
bugzilla.redhat.com/2263909
bugzilla.redhat.com/2263911
bugzilla.redhat.com/2263914
bugzilla.redhat.com/2263917
errata.almalinux.org/9/ALSA-2024-2551.html