Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-15732 | Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check. |
Fixes
Solution
Users of BIND 9.18.0 should upgrade to BIND 9.18.1
Workaround
The failure can be avoided by adding this option to named.conf: synth-from-dnssec no;
References
History
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T02:21:44.299Z
Reserved: 2022-02-16T00:00:00
Link: CVE-2022-0635

No data.

Status : Modified
Published: 2022-03-23T12:15:07.707
Modified: 2024-11-21T06:39:04.867
Link: CVE-2022-0635


No data.