openSUSE-SU-2021:0375-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2021:0375-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2021:0375-1
Related
Published
2021-03-03T08:32:48Z
Modified
2021-03-03T08:32:48Z
Summary
Security update for bind
Details

This update for bind fixes the following issues:

  • CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack [bsc#1182246]

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.2 / bind

Package

Name
bind
Purl
purl:rpm/suse/bind&distro=openSUSE%20Leap%2015.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.16.6-lp152.14.12.1

Ecosystem specific

{
    "binaries": [
        {
            "libisccfg1600-32bit": "9.16.6-lp152.14.12.1",
            "libisccfg1600": "9.16.6-lp152.14.12.1",
            "libbind9-1600-32bit": "9.16.6-lp152.14.12.1",
            "libbind9-1600": "9.16.6-lp152.14.12.1",
            "libisc1606-32bit": "9.16.6-lp152.14.12.1",
            "libirs-devel": "9.16.6-lp152.14.12.1",
            "bind-chrootenv": "9.16.6-lp152.14.12.1",
            "bind": "9.16.6-lp152.14.12.1",
            "bind-doc": "9.16.6-lp152.14.12.1",
            "libisccc1600": "9.16.6-lp152.14.12.1",
            "python3-bind": "9.16.6-lp152.14.12.1",
            "libirs1601-32bit": "9.16.6-lp152.14.12.1",
            "bind-devel": "9.16.6-lp152.14.12.1",
            "libirs1601": "9.16.6-lp152.14.12.1",
            "libisc1606": "9.16.6-lp152.14.12.1",
            "libns1604-32bit": "9.16.6-lp152.14.12.1",
            "bind-utils": "9.16.6-lp152.14.12.1",
            "libisccc1600-32bit": "9.16.6-lp152.14.12.1",
            "libdns1605-32bit": "9.16.6-lp152.14.12.1",
            "libns1604": "9.16.6-lp152.14.12.1",
            "bind-devel-32bit": "9.16.6-lp152.14.12.1",
            "libdns1605": "9.16.6-lp152.14.12.1"
        }
    ]
}