SUSE-SU-2022:1616-1: moderate: Security update for bind

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue May 31 16:18:07 UTC 2022


   SUSE Security Update: Security update for bind
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1616-1
Rating:             moderate
References:         #1197135 
Cross-References:   CVE-2021-25220
CVSS scores:
                    CVE-2021-25220 (NVD) : 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
                    CVE-2021-25220 (SUSE): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N

Affected Products:
                    HPE Helion Openstack 8
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP3-BCL
                    SUSE Linux Enterprise Server 12-SP3-LTSS
                    SUSE Linux Enterprise Server for SAP 12-SP3
                    SUSE OpenStack Cloud 8
                    SUSE OpenStack Cloud Crowbar 8
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for bind fixes the following issues:

   - CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders
     (bsc#1197135).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 8:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-1616=1

   - SUSE OpenStack Cloud 8:

      zypper in -t patch SUSE-OpenStack-Cloud-8-2022-1616=1

   - SUSE Linux Enterprise Server for SAP 12-SP3:

      zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1616=1

   - SUSE Linux Enterprise Server 12-SP3-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1616=1

   - SUSE Linux Enterprise Server 12-SP3-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-1616=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1616=1

   - HPE Helion Openstack 8:

      zypper in -t patch HPE-Helion-OpenStack-8-2022-1616=1



Package List:

   - SUSE OpenStack Cloud Crowbar 8 (noarch):

      bind-doc-9.9.9P1-63.34.1

   - SUSE OpenStack Cloud Crowbar 8 (x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE OpenStack Cloud 8 (x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE OpenStack Cloud 8 (noarch):

      bind-doc-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):

      bind-doc-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server for SAP 12-SP3 (x86_64):

      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (s390x x86_64):

      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):

      bind-doc-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP3-BCL (noarch):

      bind-doc-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      bind-doc-9.9.9P1-63.34.1

   - HPE Helion Openstack 8 (noarch):

      bind-doc-9.9.9P1-63.34.1

   - HPE Helion Openstack 8 (x86_64):

      bind-9.9.9P1-63.34.1
      bind-chrootenv-9.9.9P1-63.34.1
      bind-debuginfo-9.9.9P1-63.34.1
      bind-debugsource-9.9.9P1-63.34.1
      bind-libs-32bit-9.9.9P1-63.34.1
      bind-libs-9.9.9P1-63.34.1
      bind-libs-debuginfo-32bit-9.9.9P1-63.34.1
      bind-libs-debuginfo-9.9.9P1-63.34.1
      bind-utils-9.9.9P1-63.34.1
      bind-utils-debuginfo-9.9.9P1-63.34.1


References:

   https://www.suse.com/security/cve/CVE-2021-25220.html
   https://bugzilla.suse.com/1197135



More information about the sle-security-updates mailing list