CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
56.9%
An update is available for bind9.16.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
bind: DoS from specifically crafted TCP packets (CVE-2022-0396)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 8 | aarch64 | bind9.16 | < 9.16.23-0.9.el8.1 | bind9.16-32:9.16.23-0.9.el8.1.aarch64.rpm |
rocky | 8 | x86_64 | bind9.16 | < 9.16.23-0.9.el8.1 | bind9.16-32:9.16.23-0.9.el8.1.x86_64.rpm |
rocky | 8 | aarch64 | bind9.16-chroot | < 9.16.23-0.9.el8.1 | bind9.16-chroot-32:9.16.23-0.9.el8.1.aarch64.rpm |
rocky | 8 | x86_64 | bind9.16-chroot | < 9.16.23-0.9.el8.1 | bind9.16-chroot-32:9.16.23-0.9.el8.1.x86_64.rpm |
rocky | 8 | aarch64 | bind9.16-debuginfo | < 9.16.23-0.9.el8.1 | bind9.16-debuginfo-32:9.16.23-0.9.el8.1.aarch64.rpm |
rocky | 8 | i686 | bind9.16-debuginfo | < 9.16.23-0.9.el8.1 | bind9.16-debuginfo-32:9.16.23-0.9.el8.1.i686.rpm |
rocky | 8 | x86_64 | bind9.16-debuginfo | < 9.16.23-0.9.el8.1 | bind9.16-debuginfo-32:9.16.23-0.9.el8.1.x86_64.rpm |
rocky | 8 | aarch64 | bind9.16-debugsource | < 9.16.23-0.9.el8.1 | bind9.16-debugsource-32:9.16.23-0.9.el8.1.aarch64.rpm |
rocky | 8 | x86_64 | bind9.16-debugsource | < 9.16.23-0.9.el8.1 | bind9.16-debugsource-32:9.16.23-0.9.el8.1.x86_64.rpm |
rocky | 8 | aarch64 | bind9.16-devel | < 9.16.23-0.9.el8.1 | bind9.16-devel-32:9.16.23-0.9.el8.1.aarch64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
EPSS
Percentile
56.9%