Updated: 2024-12-04 01:45:56.873699
Description:
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | HIGH | 7.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
CentOS 6 ELS | busybox | 1.15.1 | 7.5 | HIGH | Not Vulnerable | 2024-11-13 16:35:13 | ||
CloudLinux 6 ELS | busybox | 1.15.1 | 7.5 | HIGH | Not Vulnerable | 2024-11-13 16:35:13 | ||
Oracle Linux 6 ELS | busybox | 1.15.1 | 7.5 | HIGH | Not Vulnerable | 2024-11-13 16:35:14 | ||
Ubuntu 16.04 ELS | busybox | 1.22.0 | 7.5 | HIGH | Not Vulnerable | 2024-11-13 16:35:14 | ||
Ubuntu 18.04 ELS | busybox | 1.27.2 | 7.5 | HIGH | Not Vulnerable | 2024-11-13 16:35:14 |