On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24523 On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Ubuntu USN Ubuntu USN USN-5429-1 Bind vulnerability
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.3 or BIND 9.19.1.


Workaround

No workarounds known.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-17T04:00:26.575Z

Reserved: 2022-03-30T00:00:00

Link: CVE-2022-1183

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-19T10:15:09.413

Modified: 2024-11-21T06:40:12.373

Link: CVE-2022-1183

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-18T00:00:00Z

Links: CVE-2022-1183 - Bugzilla

cve-icon OpenCVE Enrichment

No data.