Description
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.3 or BIND 9.19.1.
Vendor Workaround
No workarounds known.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24523 | On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch. |
Ubuntu USN |
USN-5429-1 | Bind vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T04:00:26.575Z
Reserved: 2022-03-30T00:00:00.000Z
Link: CVE-2022-1183
No data.
Status : Modified
Published: 2022-05-19T10:15:09.413
Modified: 2024-11-21T06:40:12.373
Link: CVE-2022-1183
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN