Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DSA-5105-1 | bind9 security update |
![]() |
EUVD-2022-15542 | BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection. |
![]() |
USN-5332-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: 9.16.27 9.18.1 BIND Supported Preview Edition is a special feature-preview branch of BIND provided to eligible ISC support customers. 9.16.27-S1
Workaround
To mitigate this issue in all affected versions of BIND, use the default setting of keep-response-order { none; }. Active exploits: We are not aware of any active exploits.
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T19:05:24.544Z
Reserved: 2022-01-27T00:00:00
Link: CVE-2022-0396

No data.

Status : Modified
Published: 2022-03-23T11:15:08.380
Modified: 2024-11-21T06:38:32.280
Link: CVE-2022-0396


No data.