Reachable Assertion Affecting bind package, versions <9.16.20-r0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE311-BIND-1567254
- published 19 Aug 2021
- disclosed 18 Aug 2021
Introduced: 18 Aug 2021
CVE-2021-25218 Open this link in a new tabHow to fix?
Upgrade Alpine:3.11 bind to version 9.16.20-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind package and not the bind package as distributed by Alpine.
See How to fix? for Alpine:3.11 relevant fixed versions and status.
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
References
- https://kb.isc.org/v1/docs/cve-2021-25218
- https://security.netapp.com/advisory/ntap-20210909-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/
- http://www.openwall.com/lists/oss-security/2021/08/18/3
- http://www.openwall.com/lists/oss-security/2021/08/20/2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/