vulnerability
SUSE: CVE-2019-6471: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jun 20, 2019 | Oct 2, 2019 | Feb 4, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jun 20, 2019
Added
Oct 2, 2019
Modified
Feb 4, 2022
Description
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
Solution(s)
suse-upgrade-bindsuse-upgrade-bind-chrootenvsuse-upgrade-bind-develsuse-upgrade-bind-devel-32bitsuse-upgrade-bind-docsuse-upgrade-bind-lwresdsuse-upgrade-bind-utilssuse-upgrade-libbind9-160suse-upgrade-libbind9-160-32bitsuse-upgrade-libbind9-1600suse-upgrade-libdns1605suse-upgrade-libdns169suse-upgrade-libdns169-32bitsuse-upgrade-libirs-develsuse-upgrade-libirs160suse-upgrade-libirs160-32bitsuse-upgrade-libirs1601suse-upgrade-libisc1606suse-upgrade-libisc166suse-upgrade-libisc166-32bitsuse-upgrade-libisccc160suse-upgrade-libisccc160-32bitsuse-upgrade-libisccc1600suse-upgrade-libisccfg160suse-upgrade-libisccfg160-32bitsuse-upgrade-libisccfg1600suse-upgrade-liblwres160suse-upgrade-liblwres160-32bitsuse-upgrade-libns1604suse-upgrade-python-bindsuse-upgrade-python3-bind

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.