Project Subscriptions
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Isc
Subscribe
|
Bind
Subscribe
|
|
Netapp
Subscribe
|
Active Iq Unified Manager
Subscribe
Aff 500f
Subscribe
Aff 500f Firmware
Subscribe
Aff A250
Subscribe
Aff A250 Firmware
Subscribe
Cloud Backup
Subscribe
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
|
|
Siemens
Subscribe
|
Sinec Infrastructure Network Services
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2647-1 | bind9 security update |
Debian DSA |
DSA-4909-1 | bind9 security update |
Ubuntu USN |
USN-4929-1 | Bind vulnerabilities |
Ubuntu USN |
USN-7739-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.31 BIND 9.16.15 BIND 9.17.12 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.31-S1 BIND 9.16.15-S1
Workaround
This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features. Prior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named. After the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T22:25:23.581Z
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25216
No data.
Status : Modified
Published: 2021-04-29T01:15:08.047
Modified: 2024-11-21T05:54:33.850
Link: CVE-2021-25216
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN