ID CVE-2015-4620
Summary name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
References
Vulnerable Configurations
  • cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
  • cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 30-10-2018 - 16:27)
Impact:
Exploitability:
CWE CWE-17
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
redhat via4
advisories
  • bugzilla
    id 1237258
    title CVE-2015-4620 bind: abort DoS caused by uninitialized value use in isselfsigned()
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment bind is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443013
        • comment bind is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651006
      • AND
        • comment bind-chroot is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443019
        • comment bind-chroot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651014
      • AND
        • comment bind-devel is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443017
        • comment bind-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651016
      • AND
        • comment bind-libs is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443005
        • comment bind-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651012
      • AND
        • comment bind-libs-lite is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443015
        • comment bind-libs-lite is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20171767022
      • AND
        • comment bind-license is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443023
        • comment bind-license is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20171767032
      • AND
        • comment bind-lite-devel is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443011
        • comment bind-lite-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20171767028
      • AND
        • comment bind-sdb is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443007
        • comment bind-sdb is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651010
      • AND
        • comment bind-sdb-chroot is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443021
        • comment bind-sdb-chroot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20171767016
      • AND
        • comment bind-utils is earlier than 32:9.9.4-18.el7_1.2
          oval oval:com.redhat.rhsa:tst:20151443009
        • comment bind-utils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651008
    rhsa
    id RHSA-2015:1443
    released 2015-07-20
    severity Important
    title RHSA-2015:1443: bind security update (Important)
  • bugzilla
    id 1237258
    title CVE-2015-4620 bind: abort DoS caused by uninitialized value use in isselfsigned()
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment bind is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471007
        • comment bind is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651006
      • AND
        • comment bind-chroot is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471005
        • comment bind-chroot is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651014
      • AND
        • comment bind-devel is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471011
        • comment bind-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651016
      • AND
        • comment bind-libs is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471013
        • comment bind-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651012
      • AND
        • comment bind-sdb is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471015
        • comment bind-sdb is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651010
      • AND
        • comment bind-utils is earlier than 32:9.8.2-0.37.rc1.el6_7.1
          oval oval:com.redhat.rhsa:tst:20151471009
        • comment bind-utils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhba:tst:20170651008
    rhsa
    id RHSA-2015:1471
    released 2015-07-22
    severity Important
    title RHSA-2015:1471: bind security update (Important)
rpms
  • bind-32:9.9.4-18.el7_1.2
  • bind-chroot-32:9.9.4-18.el7_1.2
  • bind-devel-32:9.9.4-18.el7_1.2
  • bind-libs-32:9.9.4-18.el7_1.2
  • bind-libs-lite-32:9.9.4-18.el7_1.2
  • bind-license-32:9.9.4-18.el7_1.2
  • bind-lite-devel-32:9.9.4-18.el7_1.2
  • bind-sdb-32:9.9.4-18.el7_1.2
  • bind-sdb-chroot-32:9.9.4-18.el7_1.2
  • bind-utils-32:9.9.4-18.el7_1.2
  • bind-32:9.8.2-0.37.rc1.el6_7.1
  • bind-chroot-32:9.8.2-0.37.rc1.el6_7.1
  • bind-devel-32:9.8.2-0.37.rc1.el6_7.1
  • bind-libs-32:9.8.2-0.37.rc1.el6_7.1
  • bind-sdb-32:9.8.2-0.37.rc1.el6_7.1
  • bind-utils-32:9.8.2-0.37.rc1.el6_7.1
refmap via4
bid 75588
confirm
debian DSA-3304
fedora
  • FEDORA-2015-11483
  • FEDORA-2015-11484
gentoo GLSA-201510-01
hp
  • HPSBUX03379
  • SSRT101976
sectrack 1032799
suse
  • SUSE-SU-2015:1205
  • openSUSE-SU-2015:1250
  • openSUSE-SU-2015:1326
ubuntu USN-2669-1
Last major update 30-10-2018 - 16:27
Published 08-07-2015 - 14:59
Back to Top