A new bind package with the fix for the CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216 within CentOS 6 ELS has been scheduled for gradual rollout

Extended-CentOS

A new bind package with the fix for the CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216 within CentOS 6 extended lifecycle support has been scheduled for gradual rollout from our production repository.

Rollout slot: 1

Rolled out to: 1%

ETA for 100% rollout: May, 14


Errata: https://errata.cloudlinux.com/els6/CLSA-2021-1619706041.html 


Changelog

bind-9.8.2-0.68.rc1.el6_10.10.cloudlinux.els

  • CVE-2021-25214: A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
  • CVE-2021-25215: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
  • CVE-2021-25216: The second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack

Update command

yum update bind*

Immediate update (via bypass)

yum update bind* --enablerepo=ELS6-rollout-1-bypass

A new bind package with the fix for the CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216 within CentOS 6 ELS has been scheduled for gradual rollout

Extended-CentOS

A new bind package with the fix for the CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216 within CentOS 6 extended lifecycle support has been scheduled for gradual rollout from our production repository.

Rollout slot: 1

Rolled out to: 1%

ETA for 100% rollout: May, 14


Errata: https://errata.cloudlinux.com/els6/CLSA-2021-1619706041.html 


Changelog

bind-9.8.2-0.68.rc1.el6_10.10.cloudlinux.els

  • CVE-2021-25214: A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
  • CVE-2021-25215: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
  • CVE-2021-25216: The second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack

Update command

yum update bind*

Immediate update (via bypass)

yum update bind* --enablerepo=ELS6-rollout-1-bypass

Subscribe to CloudLinux Newsletter

imunify-logo

WEB SERVER SECURITY BLOG