First published: Fri Jul 19 2024(Updated: )
Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.20.4-3 1:9.20.4-4 |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.28, 9.20.0, or 9.18.28-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4076 is considered a high severity vulnerability due to the potential for assertion failure leading to service disruption.
To fix CVE-2024-4076, upgrade to BIND 9 versions 9.16.51, 9.18.28, 9.19.25, or later.
CVE-2024-4076 affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, and 9.19.0 through 9.19.24.
If you are running BIND 9 versions within the specified ranges, your system is vulnerable to CVE-2024-4076.
CVE-2024-4076 may lead to assertion failures that can disrupt DNS services, potentially affecting network resolution.