7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | noarch | bind-license | < 9.16.23-14.el9_3.4 | bind-license-9.16.23-14.el9_3.4.noarch.rpm |
almalinux | 9 | noarch | python3-bind | < 9.16.23-14.el9_3.4 | python3-bind-9.16.23-14.el9_3.4.noarch.rpm |
almalinux | 9 | noarch | bind-dnssec-doc | < 9.16.23-14.el9_3.4 | bind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpm |
almalinux | 9 | ppc64le | bind | < 9.16.23-14.el9_3.4 | bind-9.16.23-14.el9_3.4.ppc64le.rpm |
almalinux | 9 | ppc64le | bind-chroot | < 9.16.23-14.el9_3.4 | bind-chroot-9.16.23-14.el9_3.4.ppc64le.rpm |
almalinux | 9 | ppc64le | bind-libs | < 9.16.23-14.el9_3.4 | bind-libs-9.16.23-14.el9_3.4.ppc64le.rpm |
almalinux | 9 | ppc64le | bind-dyndb-ldap | < 11.9-8.el9_3.3.alma.1 | bind-dyndb-ldap-11.9-8.el9_3.3.alma.1.ppc64le.rpm |
almalinux | 9 | ppc64le | bind-utils | < 9.16.23-14.el9_3.4 | bind-utils-9.16.23-14.el9_3.4.ppc64le.rpm |
almalinux | 9 | ppc64le | bind-dnssec-utils | < 9.16.23-14.el9_3.4 | bind-dnssec-utils-9.16.23-14.el9_3.4.ppc64le.rpm |
almalinux | 9 | x86_64 | bind | < 9.16.23-14.el9_3.4 | bind-9.16.23-14.el9_3.4.x86_64.rpm |
access.redhat.com/errata/RHSA-2024:1789
access.redhat.com/security/cve/CVE-2023-4408
access.redhat.com/security/cve/CVE-2023-50387
access.redhat.com/security/cve/CVE-2023-50868
access.redhat.com/security/cve/CVE-2023-5517
access.redhat.com/security/cve/CVE-2023-5679
access.redhat.com/security/cve/CVE-2023-6516
bugzilla.redhat.com/2263896
bugzilla.redhat.com/2263897
bugzilla.redhat.com/2263909
bugzilla.redhat.com/2263911
bugzilla.redhat.com/2263914
bugzilla.redhat.com/2263917
errata.almalinux.org/9/ALSA-2024-1789.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.05 Low
EPSS
Percentile
92.9%