A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load.
This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5504-1 bind9 security update
EUVD EUVD EUVD-2023-54109 A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Ubuntu USN Ubuntu USN USN-6390-1 Bind vulnerabilities
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.19 or 9.18.19-S1.


Workaround

Disabling listening for DNS-over-TLS connections (by removing `listen-on ... tls ... { ... };` statements from the configuration) prevents the affected code paths from being taken, rendering exploitation impossible. However, there is no workaround for this flaw if DNS-over-TLS support is required.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-02-13T17:09:18.327Z

Reserved: 2023-08-08T10:23:50.680Z

Link: CVE-2023-4236

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-20T13:15:12.313

Modified: 2024-11-21T08:34:41.190

Link: CVE-2023-4236

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-20T00:00:00Z

Links: CVE-2023-4236 - Bugzilla

cve-icon OpenCVE Enrichment

No data.