CVE-2023-4236
20.09.2023, 13:15
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.Enginsight
Vendor | Product | Version |
---|---|---|
isc | bind | 9.18.0 ≤ 𝑥 < 9.18.18 |
isc | bind | 9.18.11:s1 |
isc | bind | 9.18.18:s1 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h410s_firmware | - |
netapp | h410c_firmware | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
bind9 |
| ||||||||||||||||||
isc-dhcp |
|
Common Weakness Enumeration
References