Action not permitted
Modal body text goes here.
cve-2019-6471
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.440Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIND 9", "vendor": "ISC", "versions": [ { "status": "affected", "version": "BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] } ], "credits": [ { "lang": "en", "value": "ISC would like to thank CERN for helping us to discover this issue." } ], "datePublic": "2019-06-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "An attacker who can cause a resolver to perform queries which will be answered by a server which responds with deliberately malformed answers can cause named to exit, denying service to clients.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:07:11", "orgId": "404fd4d2-a609-4245-b543-2c944a302a22", "shortName": "isc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "solutions": [ { "lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.8\n BIND 9.12.4-P2\n BIND 9.14.3\n BIND 9.15.1\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.8-S1" } ], "source": { "discovery": "USER" }, "title": "A race condition when discarding malformed packets can cause BIND to exit with an assertion failure", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "DATE_PUBLIC": "2019-06-19T23:00:00.000Z", "ID": "CVE-2019-6471", "STATE": "PUBLIC", "TITLE": "A race condition when discarding malformed packets can cause BIND to exit with an assertion failure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIND 9", "version": { "version_data": [ { "version_name": "BIND 9", "version_value": "BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] } } ] }, "vendor_name": "ISC" } ] } }, "credit": [ { "lang": "eng", "value": "ISC would like to thank CERN for helping us to discover this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "An attacker who can cause a resolver to perform queries which will be answered by a server which responds with deliberately malformed answers can cause named to exit, denying service to clients." } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2019-6471", "refsource": "CONFIRM", "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "name": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.8\n BIND 9.12.4-P2\n BIND 9.14.3\n BIND 9.15.1\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.8-S1" } ], "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "404fd4d2-a609-4245-b543-2c944a302a22", "assignerShortName": "isc", "cveId": "CVE-2019-6471", "datePublished": "2019-10-09T14:17:14.566217Z", "dateReserved": "2019-01-16T00:00:00", "dateUpdated": "2024-09-17T01:56:17.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6471\",\"sourceIdentifier\":\"security-officer@isc.org\",\"published\":\"2019-10-09T16:15:17.170\",\"lastModified\":\"2024-11-21T04:46:30.843\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1.\"},{\"lang\":\"es\",\"value\":\"Una condici\u00f3n de carrera que puede presentarse al descartar paquetes malformados puede provocar la salida de BIND debido a un fallo de aserci\u00f3n de REQUIRE en el archivo dispatch.c. Versiones afectadas: BIND 9.11.0 hasta 9.11.7, 9.12.0 hasta 9.12.4-P1, 9.14.0 hasta 9.14.2. Tambi\u00e9n todas las versiones de la rama de desarrollo BIND 9.13 y la versi\u00f3n 9.15.0 de la rama de desarrollo BIND 9.15 y las versiones 9.11.3-S1 hasta 9.11.7-S1 de BIND Support Preview Edition.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"security-officer@isc.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"334FDC15-9CCC-4A88-86E5-E8CBC8A18629\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"2A4E33A8-E3C9-452D-95A2-0C3A959ECBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"C23EFF81-0FF4-4B4A-BAC3-85EC62230099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"24AB3C9F-77E5-4D87-A9C1-366B087E7F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E734E1C-A92F-4394-8F33-4429161BE47C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A724B2F3-E3FA-456F-9581-0213358B654C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB6D7D8-2688-48A2-8E3E-341881EF0B4C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"ADCC726B-F8E9-4F9C-B9FD-5C6F3CBD6C59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"263BD719-575D-4CC0-A61A-D6A81C8B8104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"66FCB095-3E70-472A-AB9D-60F001F3A539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"FA39C4F5-4D97-4B0B-8DA9-780F7ACF0A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292EC144-CBA2-4275-9F70-4ED65A505B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FF4312-2711-4526-B604-796E637139E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C7C45A-CC14-4092-903C-3001986D2859\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"355C962E-E284-4AF0-AD70-61C23CA229E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"8E7F909C-0F37-4FFB-96B9-5443B1BD0FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"5E4EA2A9-C197-40D4-A6AE-A64D69536F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"5A3215E6-7223-4AF1-BFD3-BD8AE9B6B572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FDA72E-991D-4451-9C8E-E738F4D12728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BFA5B4-AFC0-4E4C-A4E7-ED7BFDC3411F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF1C75A-F753-40CB-9E26-DA6D31931DDC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"EDFDB8AF-4315-4B44-AFA8-78D58AFD1DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"160670D4-FBF4-40F0-A531-F47A5D425BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"CAECED76-81A2-4A0C-8C2E-24C235BB32DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"BDC38EF1-6210-40A1-88FC-964C470E41BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"622C877B-760A-4C50-9FDF-998C010B864E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3F5F2BF-708F-40F6-9BD0-4779DE9A1785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACA0835-51AD-4AC0-8C87-5564F3A821CD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"03102DB5-6581-4B93-84E0-9A3DE06C5397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"14D67BF0-A2B1-4B5B-AAB7-80B09E2EFC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"2D7877E8-E50F-4DC6-867D-C19A8DB533E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"899BE6FE-B23F-4236-8A5E-B41AFF28E533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E8F4B6-ACF1-4F2C-A2A4-DF7382CCE628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DAD24A-2D43-498E-BC43-183B669EA1FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C046FBE7-DCCD-40FE-AC1F-4DAD11D2E0AC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"29E9362B-E23D-469B-AA78-6324B1CDDB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"C803A33D-27EA-4D9F-B198-3046AAD5E97C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"1A5E9908-C959-48FD-8FAC-C0FE329E6FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"442A56A6-935D-427A-8562-144DD770E317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80509490-50DA-42F8-8A4A-A6F6B95649BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907FEE11-DF3B-4BE7-9BAE-5F6BE20E469D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2A9F32-FF72-44AA-AA1A-5B09E8E57E24\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"053301F7-9F92-4869-854F-615AD3A156A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"BD13BE5B-8243-4A0D-9862-0435E9C883C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"88B12CA1-E853-4898-8A06-F991BE19A27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"4C98DCCF-2D89-4C05-A0AE-60CF8228B860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB76D898-4C7C-40E9-8539-E2A1BC7A5A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D185434C-67FE-4CD6-A139-BA2FCC9F8878\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4F1CFB-0FD9-4AEB-BF25-093115F9D891\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"43D44A10-E6B2-466C-AFCA-ABA73D5207E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"D59A6A14-EE0A-439B-8202-D11BD8DCAC60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"DE11CCA1-58BF-462E-A0DE-49F3BC1C5499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"639FCD86-C487-40DD-9840-8931FAF5DF3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D68F26-EF89-4016-BD3A-637951752AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1013320D-D0EE-461E-AF90-049F82AC910E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F0D363-0DE8-4E32-9187-D7ACA0868BD8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"17D9E4EE-3D52-48BD-B003-D814E14F9C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"FC23DA6F-9286-45D8-81A1-CA6FB6EC4D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"9A751827-1169-408E-BCE6-A129BDDB489D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"428C4BEA-AFDA-45EC-9D5F-DDF409461C33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A885EC50-94FA-4367-A9B2-79C8678DEE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADAD6E9A-F8B5-4B2D-B687-AEAB518B8F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BF46DCE-2603-4E61-87B8-352FF4111567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3879431-2E02-4B6C-BB4F-C2FF631A0974\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"3B3E05E8-B2CF-44D6-B15C-C02A6DA49276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"3EDDC264-DE67-46A3-8F1A-9B1F965712E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"75D817B1-EC06-4180-B272-067299818B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"0E3A4646-9AAA-445E-A08F-226D41485DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9ED500-5797-4692-B68B-84791F7BDC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E592A7-B530-4932-A81D-D1B9ABD64047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71666E6B-8615-4D7B-9A7B-2F6D048FE086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A99DC2F-BFC7-4FEA-87DF-5E9DF428F2D3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"2F041B77-BAA4-41C9-A02F-283B5A508ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"D37EF199-1CA5-4201-8F58-856C70B536F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"F367EED9-1F71-4720-BE53-3074FF6049C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"20BF15AA-1183-489E-A24A-FFB5BFD84664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"262AA78E-38BE-4210-A0E1-7940F023AC7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A85C15-B821-4992-9B06-45767E7467D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8EBE1A-2E66-4E40-8A11-8B6D21914E5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D0AF1B-9106-4C38-B1A2-87FC189ADBAB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"0224CE5D-B406-4733-912B-8FC1FD19DF54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"609EB179-115D-4146-AAF1-D8C4E0530D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"E72B035F-97C1-41C6-B424-F3929B9D7A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"E058E775-EAAA-46DF-9F3D-A8D042AAFD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20A725C-C676-4106-AD82-771B8D4BFF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF10213-FBE4-47A5-8EF2-B45BF15BEB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDE4D90-5AE4-4183-997E-188FF17D497E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B872A0D5-9B23-40F2-8AAB-253A4F406D18\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.11.0\",\"versionEndIncluding\":\"9.11.7\",\"matchCriteriaId\":\"1E56997D-BE14-4FAE-9B7F-6F64E417B14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.12.0\",\"versionEndIncluding\":\"9.12.3\",\"matchCriteriaId\":\"7C114129-FCB0-4EE9-A538-896C36F2739B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.13.0\",\"versionEndIncluding\":\"9.13.7\",\"matchCriteriaId\":\"EA8EE96D-C27B-4995-BFB2-B4AC55ACAE8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.14.0\",\"versionEndIncluding\":\"9.14.2\",\"matchCriteriaId\":\"3388BAEC-A936-491F-9B51-DAFC7CE3D45A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.15.0\",\"versionEndIncluding\":\"9.15.5\",\"matchCriteriaId\":\"8889BE5E-3E97-401A-BC81-082F77F72576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"C2FE13E1-0646-46FC-875B-CB4C34E20101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"AB2B92F1-6BA8-41CA-9000-E0633462CC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.12.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E1818DE-94E7-4371-999D-DA217F664E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.12.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E121D018-42B7-467E-9481-EDA4021401AF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F5FEE7-059A-4A9B-BCCD-18F0AA435040\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1.0\",\"versionEndIncluding\":\"5.4.0\",\"matchCriteriaId\":\"928A7D30-8099-47B8-A1D2-A4997F54C1C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.1.0\",\"matchCriteriaId\":\"F37D18F2-8C6A-4557-85DC-2A751595423C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3CE7526-9630-48EF-81FB-44904AF0653F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.5.9\",\"matchCriteriaId\":\"F4846F5F-F5D9-405F-8A6D-4D4CA19DA04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.6.1\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"7190E93F-6B10-479C-99CD-9253FCED4F41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"6166E0DB-2BA5-454D-ABBC-9E4916436A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"F42F4AF6-4BCC-497E-A889-0BBCA965CB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589511FF-F93F-4C54-B89B-B7228EA68F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7BBEC67-BD2E-49D5-8294-977D975D98D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C529A4BA-F1B7-4297-A9CC-2FF0EB2CB5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4AE425-1D86-4DB9-8B8F-74C6678BD528\"}]}]}],\"references\":[{\"url\":\"https://kb.isc.org/docs/cve-2019-6471\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://kb.isc.org/docs/cve-2019-6471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2019-6471
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6471", "description": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1.", "id": "GSD-2019-6471", "references": [ "https://www.suse.com/security/cve/CVE-2019-6471.html", "https://access.redhat.com/errata/RHSA-2019:1714", "https://ubuntu.com/security/CVE-2019-6471", "https://advisories.mageia.org/CVE-2019-6471.html", "https://linux.oracle.com/cve/CVE-2019-6471.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6471" ], "details": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1.", "id": "GSD-2019-6471", "modified": "2023-12-13T01:23:49.664734Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "DATE_PUBLIC": "2019-06-19T23:00:00.000Z", "ID": "CVE-2019-6471", "STATE": "PUBLIC", "TITLE": "A race condition when discarding malformed packets can cause BIND to exit with an assertion failure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIND 9", "version": { "version_data": [ { "version_name": "BIND 9", "version_value": "BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] } } ] }, "vendor_name": "ISC" } ] } }, "credit": [ { "lang": "eng", "value": "ISC would like to thank CERN for helping us to discover this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "An attacker who can cause a resolver to perform queries which will be answered by a server which responds with deliberately malformed answers can cause named to exit, denying service to clients." } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2019-6471", "refsource": "CONFIRM", "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "name": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS" } ] }, "solution": [ { "lang": "eng", "value": "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.8\n BIND 9.12.4-P2\n BIND 9.14.3\n BIND 9.15.1\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.8-S1" } ], "source": { "discovery": "USER" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_webaccelerator:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.12.3", "versionStartIncluding": "9.12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.12.4:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.13.7", "versionStartIncluding": "9.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.15.5", "versionStartIncluding": "9.15.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.11.7", "versionStartIncluding": "9.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.12.4:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.14.2", "versionStartIncluding": "9.14.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.4.0", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.1.0", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.1.4", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "13.1.1", "versionStartIncluding": "13.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:14.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.6.4", "versionStartIncluding": "11.6.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.5.9", "versionStartIncluding": "11.5.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "ID": "CVE-2019-6471" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-617" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2019-6471", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "name": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2021-07-21T11:39Z", "publishedDate": "2019-10-09T16:15Z" } } }
var-201910-0306
Vulnerability from variot
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1. ISC BIND 9 There is a service disruption (DoS) Vulnerabilities exist. An attacker can exploit this issue to cause a denial-of-service condition. ISC BIND is a set of open source software developed by ISC Corporation in the United States that implements the DNS protocol. The vulnerability stems from the improper handling of concurrent access when concurrent codes need to access shared resources mutually exclusive during the running of the network system or product. An attacker could exploit this vulnerability by sending a request that submits malicious input to the targeted system.
ISC has confirmed the vulnerability and released software updates. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] bind (SSA:2019-171-01)
New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a denial-of-service security issue.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/bind-9.11.8-i586-1_slack14.2.txz: Upgraded. For more information, see: https://kb.isc.org/docs/cve-2019-6471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6471 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.8-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.8-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.8-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.8-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.8-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.8-x86_64-1_slack14.2.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.14.3-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.14.3-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 14.0 package: 9607f8e5a02ddd973b611b132e27a18a bind-9.11.8-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 7ca41b2cc7476a177d86efb8e0d635ca bind-9.11.8-x86_64-1_slack14.0.txz
Slackware 14.1 package: 82fe22a0cd33f6401ea24ad0f2f4a3d3 bind-9.11.8-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: b5abf1923df6e5eeb88d3ef2764cf74c bind-9.11.8-x86_64-1_slack14.1.txz
Slackware 14.2 package: c94fa2993da21984d436c8f7e6a31478 bind-9.11.8-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 681a10d5b96c806146b68e15c785e073 bind-9.11.8-x86_64-1_slack14.2.txz
Slackware -current package: 27af9b7debe692841182193eb397e2da n/bind-9.14.3-i586-1.txz
Slackware x86_64 -current package: a8e742c791d996a68be9e687a50b8288 n/bind-9.14.3-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg bind-9.11.8-i586-1_slack14.2.txz
Then, restart the name server:
/etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAl0LzDsACgkQakRjwEAQIjOsnQCeN3xh8ruGxMCerBrwdOiuDE+M bwoAn2F6rHk2C5UOr5B6Yqbt77gfk7eh =Q1GL -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-4026-1 June 20, 2019
bind9 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
Summary:
Bind could be made to crash if it received specially crafted network traffic.
Software Description: - bind9: Internet Domain Name Server
Details:
It was discovered that Bind incorrectly handled certain malformed packets. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: bind9 1:9.11.5.P1+dfsg-1ubuntu2.5
Ubuntu 18.10: bind9 1:9.11.4+dfsg-3ubuntu5.4
Ubuntu 18.04 LTS: bind9 1:9.11.3+dfsg-1ubuntu1.8
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4026-1 CVE-2019-6471
Package Information: https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.P1+dfsg-1ubuntu2.5 https://launchpad.net/ubuntu/+source/bind9/1:9.11.4+dfsg-3ubuntu5.4 https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.8
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bind", "scope": "eq", "trust": 1.3, "vendor": "isc", "version": "9.12.4" }, { "model": "bind", "scope": "eq", "trust": 1.3, "vendor": "isc", "version": "9.11.7" }, { "model": "bind", "scope": "eq", "trust": 1.3, "vendor": "isc", "version": "9.11.3" }, { "model": "big-ip link controller", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip global traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "9.2.2" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip fraud protection service", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "iworkflow", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "2.3.0" }, { "model": "big-ip global traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "bind", "scope": "gte", "trust": 1.0, "vendor": "isc", "version": "9.12.0" }, { "model": "bind", "scope": "lte", "trust": 1.0, "vendor": "isc", "version": "9.13.7" }, { "model": "big-ip edge gateway", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip edge gateway", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip advanced firewall manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip application security manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip edge gateway", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "bind", "scope": "gte", "trust": 1.0, "vendor": "isc", "version": "9.13.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip fraud protection service", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip application security manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip application acceleration manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip edge gateway", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip domain name system", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip domain name system", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip policy enforcement manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip policy enforcement manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "9.2.2" }, { "model": "big-ip fraud protection service", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip analytics", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "bind", "scope": "lte", "trust": 1.0, "vendor": "isc", "version": "9.11.7" }, { "model": "big-ip application acceleration manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip application acceleration manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip application security manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip policy enforcement manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip edge gateway", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "bind", "scope": "gte", "trust": 1.0, "vendor": "isc", "version": "9.11.0" }, { "model": "big-ip global traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip domain name system", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip local traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip application security manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip advanced firewall manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip edge gateway", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip policy enforcement manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip global traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip policy enforcement manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip webaccelerator", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip domain name system", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip webaccelerator", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip application security manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip link controller", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip fraud protection service", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip policy enforcement manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip policy enforcement manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "9.2.2" }, { "model": "big-ip global traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip application acceleration manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip application security manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip domain name system", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip global traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip global traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-iq centralized management", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "5.4.0" }, { "model": "big-ip fraud protection service", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip webaccelerator", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip edge gateway", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip analytics", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip application security manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip application security manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip application security manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-iq centralized management", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "6.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip application acceleration manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "bind", "scope": "lte", "trust": 1.0, "vendor": "isc", "version": "9.15.5" }, { "model": "big-ip webaccelerator", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip webaccelerator", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-iq centralized management", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "5.1.0" }, { "model": "big-ip global traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip link controller", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "bind", "scope": "lte", "trust": 1.0, "vendor": "isc", "version": "9.12.3" }, { "model": "enterprise manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "3.1.1" }, { "model": "big-ip analytics", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip webaccelerator", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip domain name system", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "9.2.2" }, { "model": "big-ip local traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip link controller", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip global traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip fraud protection service", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip domain name system", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip advanced firewall manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip fraud protection service", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "bind", "scope": "lte", "trust": 1.0, "vendor": "isc", "version": "9.14.2" }, { "model": "big-ip analytics", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip policy enforcement manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip webaccelerator", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip application acceleration manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip global traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip global traffic manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip application acceleration manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "bind", "scope": "gte", "trust": 1.0, "vendor": "isc", "version": "9.15.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip edge gateway", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip policy enforcement manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip fraud protection service", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "bind", "scope": "gte", "trust": 1.0, "vendor": "isc", "version": "9.14.0" }, { "model": "big-ip link controller", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "13.1.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip application acceleration manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip access policy manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip application security manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip policy enforcement manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip local traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip advanced firewall manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip advanced firewall manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip global traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip advanced firewall manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "big-ip application acceleration manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip local traffic manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip link controller", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip domain name system", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "9.2.2" }, { "model": "big-ip webaccelerator", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip access policy manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip fraud protection service", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip fraud protection service", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip advanced firewall manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.6.4" }, { "model": "big-ip fraud protection service", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "11.5.9" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-iq centralized management", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "6.0.0" }, { "model": "big-ip application security manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip local traffic manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip application acceleration manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "12.1.4" }, { "model": "big-ip application acceleration manager", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip access policy manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "15.0.0" }, { "model": "big-ip policy enforcement manager", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "13.1.1" }, { "model": "big-ip domain name system", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.1.0" }, { "model": "big-ip policy enforcement manager", "scope": "eq", "trust": 1.0, "vendor": "f5", "version": "14.0.0" }, { "model": "bind", "scope": "eq", "trust": 0.8, "vendor": "isc", "version": "9.15 development branch of 9.15.0" }, { "model": "bind", "scope": "lte", "trust": 0.8, "vendor": "isc", "version": "9.11.0 from 9.11.7" }, { "model": "bind", "scope": "lte", "trust": 0.8, "vendor": "isc", "version": "9.12.0 from 9.12.4-p1" }, { "model": "bind", "scope": "eq", "trust": 0.8, "vendor": "isc", "version": "9.13 development branch of" }, { "model": "bind", "scope": "lte", "trust": 0.8, "vendor": "isc", "version": "9.14.0 from 9.14.2" }, { "model": "bind", "scope": "lte", "trust": 0.8, "vendor": "isc", "version": "supported preview edition of 9.11.3-s1 from 9.11.7-s1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.15" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.14.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.14.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.14" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.7" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.6" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.5" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.13" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.12.3" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.12.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.12.1" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.12" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.6" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.5" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.4" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.2" }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.1" }, { "model": "bind 9.14.0rc3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.14.0rc2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.14.0rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.13.5-w1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.4-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.3rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.3-p4", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.3-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.3-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.2rc2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.2rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.2-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.2-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.1rc2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.1rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.1b1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.1-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.1-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0rc3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0rc2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0b2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0b1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.12.0a1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.7-s1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.6-s1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.6-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-s6", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-s5", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-s3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-p4", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.5-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.4-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.4-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.2-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.1rc3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.1rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.1b1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.1-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.1-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0rc3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0b2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0b1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0a3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0-p5", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0-p3", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0-p2", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.0-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "9.11.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.15.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.14.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.11.8" }, { "model": "bind 9.12.4-p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "bind 9.11.8-s1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null } ], "sources": [ { "db": "BID", "id": "108854" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:isc:bind", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005496" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu,CERN,Red Hat,Slackware Security Team", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-823" } ], "trust": 0.6 }, "cve": "CVE-2019-6471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-6471", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-005496", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-157906", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2019-6471", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "security-officer@isc.org", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2019-6471", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2019-005496", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6471", "trust": 1.0, "value": "MEDIUM" }, { "author": "security-officer@isc.org", "id": "CVE-2019-6471", "trust": 1.0, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2019-005496", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201906-823", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-157906", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-6471", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-157906" }, { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "CNNVD", "id": "CNNVD-201906-823" }, { "db": "NVD", "id": "CVE-2019-6471" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1. ISC BIND 9 There is a service disruption (DoS) Vulnerabilities exist. \nAn attacker can exploit this issue to cause a denial-of-service condition. ISC BIND is a set of open source software developed by ISC Corporation in the United States that implements the DNS protocol. The vulnerability stems from the improper handling of concurrent access when concurrent codes need to access shared resources mutually exclusive during the running of the network system or product. An attacker could exploit this vulnerability by sending a request that submits malicious input to the targeted system. \n\nISC has confirmed the vulnerability and released software updates. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n[slackware-security] bind (SSA:2019-171-01)\n\nNew bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to\nfix a denial-of-service security issue. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/bind-9.11.8-i586-1_slack14.2.txz: Upgraded. \n For more information, see:\n https://kb.isc.org/docs/cve-2019-6471\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6471\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.8-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.8-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.8-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.8-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.8-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.8-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.14.3-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.14.3-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.0 package:\n9607f8e5a02ddd973b611b132e27a18a bind-9.11.8-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7ca41b2cc7476a177d86efb8e0d635ca bind-9.11.8-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n82fe22a0cd33f6401ea24ad0f2f4a3d3 bind-9.11.8-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\nb5abf1923df6e5eeb88d3ef2764cf74c bind-9.11.8-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\nc94fa2993da21984d436c8f7e6a31478 bind-9.11.8-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n681a10d5b96c806146b68e15c785e073 bind-9.11.8-x86_64-1_slack14.2.txz\n\nSlackware -current package:\n27af9b7debe692841182193eb397e2da n/bind-9.14.3-i586-1.txz\n\nSlackware x86_64 -current package:\na8e742c791d996a68be9e687a50b8288 n/bind-9.14.3-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg bind-9.11.8-i586-1_slack14.2.txz\n\nThen, restart the name server:\n\n# /etc/rc.d/rc.bind restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. |\n+------------------------------------------------------------------------+\n-----BEGIN PGP SIGNATURE-----\n\niEYEARECAAYFAl0LzDsACgkQakRjwEAQIjOsnQCeN3xh8ruGxMCerBrwdOiuDE+M\nbwoAn2F6rHk2C5UOr5B6Yqbt77gfk7eh\n=Q1GL\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-4026-1\nJune 20, 2019\n\nbind9 vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n- Ubuntu 18.10\n- Ubuntu 18.04 LTS\n\nSummary:\n\nBind could be made to crash if it received specially crafted network\ntraffic. \n\nSoftware Description:\n- bind9: Internet Domain Name Server\n\nDetails:\n\nIt was discovered that Bind incorrectly handled certain malformed packets. \nA remote attacker could possibly use this issue to cause Bind to crash,\nresulting in a denial of service. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n bind9 1:9.11.5.P1+dfsg-1ubuntu2.5\n\nUbuntu 18.10:\n bind9 1:9.11.4+dfsg-3ubuntu5.4\n\nUbuntu 18.04 LTS:\n bind9 1:9.11.3+dfsg-1ubuntu1.8\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n https://usn.ubuntu.com/4026-1\n CVE-2019-6471\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.P1+dfsg-1ubuntu2.5\n https://launchpad.net/ubuntu/+source/bind9/1:9.11.4+dfsg-3ubuntu5.4\n https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.8\n\n", "sources": [ { "db": "NVD", "id": "CVE-2019-6471" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "BID", "id": "108854" }, { "db": "VULHUB", "id": "VHN-157906" }, { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "PACKETSTORM", "id": "153376" }, { "db": "PACKETSTORM", "id": "153358" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6471", "trust": 3.2 }, { "db": "BID", "id": "108854", "trust": 1.0 }, { "db": "PACKETSTORM", "id": "153376", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "153358", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "153576", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90363752", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005496", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-823", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-157906", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-6471", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157906" }, { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "BID", "id": "108854" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "PACKETSTORM", "id": "153576" }, { "db": "PACKETSTORM", "id": "153376" }, { "db": "PACKETSTORM", "id": "153358" }, { "db": "CNNVD", "id": "CNNVD-201906-823" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "id": "VAR-201910-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-157906" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:21:26.390000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2019-6471: A race condition when discarding malformed packets can cause BIND to exit with an assertion failure", "trust": 0.8, "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "title": "ISC BIND Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93972" }, { "title": "Red Hat: Important: bind security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191714 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: bind9: CVE-2019-6471: A race condition when discarding malformed packets can cause BIND to exit with an assertion failure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a094fa4e4f9c0e2f138cc23eb95dfd96" }, { "title": "Ubuntu Security Notice: bind9 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4026-1" }, { "title": "Red Hat: CVE-2019-6471", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2019-6471" }, { "title": "IBM: IBM Security Bulletin: IBM i is affected by networking BIND vulnerability CVE-2019-6471.", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=8723baa499717961d245da059c425629" }, { "title": "Forcepoint Security Advisories: CVE-2019-6471 (BIND)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories\u0026qid=3c54cf1325d610aa05e8e9746ea674ba" }, { "title": "bind", "trust": 0.1, "url": "https://github.com/Seabreg/bind " }, { "title": "bind9", "trust": 0.1, "url": "https://github.com/bg6cq/bind9 " }, { "title": "", "trust": 0.1, "url": "https://github.com/pexip/os-bind9-libs " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "CNNVD", "id": "CNNVD-201906-823" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "CWE-617", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157906" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "trust": 1.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6471" }, { "trust": 1.0, "url": "https://support.f5.com/csp/article/k10092301?utm_source=f5support\u0026amp%3butm_medium=rss" }, { "trust": 0.9, "url": "http://www.isc.org/products/bind/" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6471" }, { "trust": 0.8, "url": "https://www.nic.ad.jp/ja/topics/2019/20190620-01.html" }, { "trust": 0.8, "url": "https://jprs.jp/tech/security/2019-06-20-bind9-vuln-malformed-packets.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90363752/" }, { "trust": 0.7, "url": "https://support.f5.com/csp/article/k10092301?utm_source=f5support\u0026utm_medium=rss" }, { "trust": 0.7, "url": "https://usn.ubuntu.com/4026-1/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153358/ubuntu-security-notice-usn-4026-1.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/isc-bind-assertion-error-via-resolver-dispatch-c-29581" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108854" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153376/slackware-security-advisory-bind-updates.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153576/red-hat-security-advisory-2019-1714-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2225/" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2019:1714" }, { "trust": 0.1, "url": "https://support.f5.com/csp/article/k10092301?utm_source=f5support\u0026amp;amp;utm_medium=rss" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/617.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=60373" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-6471" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4026-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bind9/1:9.11.4+dfsg-3ubuntu5.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bind9/1:9.11.3+dfsg-1ubuntu1.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/bind9/1:9.11.5.p1+dfsg-1ubuntu2.5" } ], "sources": [ { "db": "VULHUB", "id": "VHN-157906" }, { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "BID", "id": "108854" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "PACKETSTORM", "id": "153576" }, { "db": "PACKETSTORM", "id": "153376" }, { "db": "PACKETSTORM", "id": "153358" }, { "db": "CNNVD", "id": "CNNVD-201906-823" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-157906" }, { "db": "VULMON", "id": "CVE-2019-6471" }, { "db": "BID", "id": "108854" }, { "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "db": "PACKETSTORM", "id": "153576" }, { "db": "PACKETSTORM", "id": "153376" }, { "db": "PACKETSTORM", "id": "153358" }, { "db": "CNNVD", "id": "CNNVD-201906-823" }, { "db": "NVD", "id": "CVE-2019-6471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-157906" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2019-6471" }, { "date": "2019-06-19T00:00:00", "db": "BID", "id": "108854" }, { "date": "2019-06-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "date": "2019-07-10T19:01:43", "db": "PACKETSTORM", "id": "153576" }, { "date": "2019-06-21T12:12:00", "db": "PACKETSTORM", "id": "153376" }, { "date": "2019-06-20T18:49:06", "db": "PACKETSTORM", "id": "153358" }, { "date": "2019-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-823" }, { "date": "2019-10-09T16:15:17.170000", "db": "NVD", "id": "CVE-2019-6471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-01T00:00:00", "db": "VULHUB", "id": "VHN-157906" }, { "date": "2021-07-21T00:00:00", "db": "VULMON", "id": "CVE-2019-6471" }, { "date": "2019-06-19T00:00:00", "db": "BID", "id": "108854" }, { "date": "2019-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005496" }, { "date": "2021-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-823" }, { "date": "2024-11-21T04:46:30.843000", "db": "NVD", "id": "CVE-2019-6471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "153358" }, { "db": "CNNVD", "id": "CNNVD-201906-823" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ISC BIND 9 Service operation interruption (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005496" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-823" } ], "trust": 0.6 } }
ghsa-52fp-qxmc-8q94
Vulnerability from github
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
{ "affected": [], "aliases": [ "CVE-2019-6471" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-10-09T16:15:00Z", "severity": "MODERATE" }, "details": "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -\u003e 9.11.7, 9.12.0 -\u003e 9.12.4-P1, 9.14.0 -\u003e 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -\u003e 9.11.7-S1.", "id": "GHSA-52fp-qxmc-8q94", "modified": "2022-05-24T16:58:21Z", "published": "2022-05-24T16:58:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6471" }, { "type": "WEB", "url": "https://kb.isc.org/docs/cve-2019-6471" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K10092301?utm_source=f5support\u0026amp;utm_medium=RSS" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2019_1714
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure (CVE-2019-6471)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1714", "url": "https://access.redhat.com/errata/RHSA-2019:1714" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1721780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721780" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1714.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T13:26:56+00:00", "generator": { "date": "2024-11-22T13:26:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:1714", "initial_release_date": "2019-07-10T09:10:08+00:00", "revision_history": [ { "date": "2019-07-10T09:10:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-07-10T09:10:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:26:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_id": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-17.P2.el8_0.1?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_id": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-17.P2.el8_0.1?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "product": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_id": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-17.P2.el8_0.1?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_id": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-17.P2.el8_0.1?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_id": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-17.P2.el8_0.1?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "product": { "name": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "product_id": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.4-17.P2.el8_0.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "product": { "name": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "product_id": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.11.4-17.P2.el8_0.1?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-17.P2.el8_0.1.src", "product": { "name": "bind-32:9.11.4-17.P2.el8_0.1.src", "product_id": "bind-32:9.11.4-17.P2.el8_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-17.P2.el8_0.1?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.src", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch" }, "product_reference": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch" }, "product_reference": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.src", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch" }, "product_reference": "bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch" }, "product_reference": "python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "ISC" ] } ], "cve": "CVE-2019-6471", "discovery_date": "2019-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1721780" } ], "notes": [ { "category": "description", "text": "A race condition leading to denial of service was found in the way bind handled certain malformed packets. A remote attacker who could cause the bind resolver to perform queries on a server, which responds deliberately with malformed answers, could cause named to exit.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This bind flaw can be exploited by a remote attacker (AV:N). However the attack works only if the attacker could cause the bind server to perform queries on another DNS server and the other DNS server deliberately responds with malformed answers (AC:H). No other special privileges are required by the attacker (PR:L). No user interaction is required from the server side (UI:N). The attacker can cause denial of service (A:H) by causing the named process to exit with an assertion flaw. There is no affect on the Confidentiality or Integrity of the system (C:N/I:N).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-6471" }, { "category": "external", "summary": "RHBZ#1721780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721780" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-6471", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-6471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6471" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2019-6471", "url": "https://kb.isc.org/docs/cve-2019-6471" } ], "release_date": "2019-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-07-10T09:10:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "AppStream-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "AppStream-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "AppStream-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.src", "BaseOS-8.0.0.Z:bind-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-debugsource-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-export-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-libs-lite-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-license-32:9.11.4-17.P2.el8_0.1.noarch", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-lite-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-devel-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-libs-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-pkcs11-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-chroot-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-sdb-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.aarch64", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.i686", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.ppc64le", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.s390x", "BaseOS-8.0.0.Z:bind-utils-debuginfo-32:9.11.4-17.P2.el8_0.1.x86_64", "BaseOS-8.0.0.Z:python3-bind-32:9.11.4-17.P2.el8_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.