First published: Fri Jul 19 2024(Updated: )
Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This vulnerability affects upstream's bind9 versions bellow: 9.16.13 -> 9.16.50 9.18.0 -> 9.18.27 9.19.0 -> 9.19.24
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Bind9-libs | >=9.16.13<9.16.50 | |
Ubuntu Bind9-libs | >=9.18.0<9.18.27 | |
Ubuntu Bind9-libs | >=9.19.0<9.19.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2298904 is classified as a medium severity vulnerability due to its potential for assertion failure leading to service disruption.
To fix REDHAT-BUG-2298904, upgrade BIND 9 to versions 9.16.50, 9.18.27, or 9.19.24 or later.
Versions of BIND affected by REDHAT-BUG-2298904 include those below 9.16.50, 9.18.27, and 9.19.24.
REDHAT-BUG-2298904 is caused by client queries that may trigger stale data serving and require lookups in local authoritative zone data.
There are no official workarounds for REDHAT-BUG-2298904; upgrading to a fixed version is the recommended action.