CVE-2023-4236

Name
CVE-2023-4236
Description
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://kb.isc.org/docs/cve-2023-4236
MISC http://www.openwall.com/lists/oss-security/2023/09/20/2
MISC https://www.debian.org/security/2023/dsa-5504
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/
MISC https://security.netapp.com/advisory/ntap-20231013-0004/
MISC https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:isc:bind:9.18.18:s1:*:*:supported_preview:*:*:* bind == None == 9.18.18
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* bind >= 9.18.0 < 9.18.18
cpe:2.3:a:isc:bind:9.18.11:s1:*:*:supported_preview:*:*:* bind == None == 9.18.11

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
bind edge-main 9.18.19-r0 Mike Crute <mike@crute.us> fixed
bind edge-main 9.18.18-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.17-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.16-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.14-r4 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.14-r3 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.14-r2 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.14-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.13-r2 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.13-r1 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.13-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.11-r0 Mike Crute <mike@crute.us> possibly vulnerable
bind edge-main 9.18.10-r0 None possibly vulnerable
bind edge-main 9.18.9-r0 None possibly vulnerable
bind edge-main 9.18.8-r0 None possibly vulnerable
bind edge-main 9.18.7-r0 None possibly vulnerable
bind edge-main 9.18.5-r0 None possibly vulnerable
bind edge-main 9.18.4-r3 None possibly vulnerable
bind edge-main 9.18.4-r2 None possibly vulnerable
bind edge-main 9.18.3-r2 None possibly vulnerable
bind edge-main 9.18.3-r1 None possibly vulnerable
bind edge-main 9.18.3-r0 None possibly vulnerable
bind 3.22-main 9.18.19-r0 None fixed
bind 3.22-main 9.18.11-r0 None possibly vulnerable
bind 3.22-main 9.18.7-r0 None possibly vulnerable
bind 3.21-main 9.18.19-r0 None fixed
bind 3.21-main 9.18.11-r0 None possibly vulnerable
bind 3.21-main 9.18.7-r0 None possibly vulnerable
bind 3.20-main 9.18.19-r0 None fixed
bind 3.20-main 9.18.11-r0 None possibly vulnerable
bind 3.20-main 9.18.7-r0 None possibly vulnerable
bind 3.19-main 9.18.19-r0 None fixed
bind 3.19-main 9.18.11-r0 None possibly vulnerable
bind 3.19-main 9.18.7-r0 None possibly vulnerable
bind 3.18-main 9.18.19-r0 Mike Crute <mike@crute.us> fixed
bind 3.17-main 9.18.19-r0 None fixed