First published: Fri Jul 19 2024(Updated: )
Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name. This vulnerability affects the following bind versions: 9.11.0 -> 9.11.37 9.16.0 -> 9.16.50 9.18.0 -> 9.18.27 9.19.0 -> 9.19.24
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | >=9.11.0<9.11.37 | |
BIND 9 | >=9.16.0<9.16.50 | |
BIND 9 | >=9.18.0<9.18.27 | |
BIND 9 | >=9.19.0<9.19.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2298893 is classified as moderate.
To fix REDHAT-BUG-2298893, upgrade your BIND version to the latest recommended release.
BIND versions 9.11.0 to 9.11.37, 9.16.0 to 9.16.50, 9.18.0 to 9.18.27, and 9.19.0 to 9.19.24 are affected by REDHAT-BUG-2298893.
REDHAT-BUG-2298893 can cause degraded performance in resolver caches and authoritative zone databases.
The REDHAT-BUG-2298893 vulnerability is associated with the Internet Systems Consortium (ISC) BIND software.