{
  "schema_version": "1.7.0",
  "id": "RHSA-2013:0690",
  "related": [],
  "upstream": [
    "CVE-2013-2266"
  ],
  "published": "2024-09-15T20:45:03Z",
  "modified": "2025-11-22T10:43:25Z",
  "summary": "Red Hat Security Advisory: bind97 security update",
  "affected": [
    {
      "package": {
        "name": "bind97",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "bind97-chroot",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97-chroot"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "bind97-debuginfo",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "bind97-devel",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "bind97-libs",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97-libs"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "bind97-utils",
        "ecosystem": "Red Hat:enterprise_linux:5::server",
        "purl": "pkg:rpm/redhat/bind97-utils"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "32:9.7.0-17.P2.el5_9.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2013:0690"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "ARTICLE",
      "url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928027"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0690.json"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2013-2266"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-2266"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2266"
    },
    {
      "type": "ARTICLE",
      "url": "https://kb.isc.org/article/AA-00871"
    },
    {
      "type": "ARTICLE",
      "url": "https://kb.isc.org/article/AA-00879"
    }
  ]
}