BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5105-1 bind9 security update
EUVD EUVD EUVD-2022-15542 BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Ubuntu USN Ubuntu USN USN-5332-1 Bind vulnerabilities
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND: 9.16.27 9.18.1 BIND Supported Preview Edition is a special feature-preview branch of BIND provided to eligible ISC support customers. 9.16.27-S1


Workaround

To mitigate this issue in all affected versions of BIND, use the default setting of keep-response-order { none; }. Active exploits: We are not aware of any active exploits.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-16T19:05:24.544Z

Reserved: 2022-01-27T00:00:00

Link: CVE-2022-0396

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-23T11:15:08.380

Modified: 2024-11-21T06:38:32.280

Link: CVE-2022-0396

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-03-16T00:00:00Z

Links: CVE-2022-0396 - Bugzilla

cve-icon OpenCVE Enrichment

No data.