First published: Wed Sep 20 2023(Updated: )
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Credit: security-officer@isc.org security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | <=1:9.18.16-1~deb12u1<=1:9.18.16-1 | 1:9.18.19-1~deb12u1 1:9.19.17-1 |
ISC BIND | >=9.18.0<9.18.18 | |
ISC BIND | =9.18.11-s1 | |
ISC BIND | =9.18.18-s1 | |
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u10 1:9.16.44-1~deb11u1 1:9.16.48-1 1:9.18.19-1~deb12u1 1:9.18.24-1 1:9.19.21-1 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
ubuntu/bind9 | <1:9.18.12-0ubuntu0.22.04.3 | 1:9.18.12-0ubuntu0.22.04.3 |
ubuntu/bind9 | <1:9.18.12-1ubuntu1.2 | 1:9.18.12-1ubuntu1.2 |
ubuntu/bind9 | <1:9.18.18-0ubuntu2 | 1:9.18.18-0ubuntu2 |
ubuntu/bind9 | <1:9.18.18-0ubuntu2 | 1:9.18.18-0ubuntu2 |
ubuntu/bind9 | <9.18.19 | 9.18.19 |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.19 or 9.18.19-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4236 is a vulnerability in BIND 9, the DNS server software developed by ISC.
CVE-2023-4236 affects BIND 9 versions 9.18.0 through 9.18.18.
The severity of CVE-2023-4236 is rated as high, with a CVSS score of 7.5.
CVE-2023-4236 may cause the 'named' process to terminate unexpectedly due to an assertion failure, leading to a denial of service (DoS) condition.
To mitigate CVE-2023-4236, it is recommended to update BIND 9 to a version that includes the necessary fixes, such as 9.18.19.