Search CVE reports
1 – 10 of 83 results
Some fixes available 1 of 6
A use-after-return vulnerability exists in the `named` server when handling DNS queries signed with SIG(0). Using a specially-crafted DNS request, an attacker may be able to cause an ACL to improperly (mis)match an IP address. In...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 1 of 6
Under certain conditions, `named` may crash when processing a correctly signed query containing a TKEY record. The affected code can only be reached if an incoming request has a valid transaction signature (TSIG) from a key...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 1 of 6
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 3 of 12
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Needs evaluation | Needs evaluation |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |
Some fixes available 5 of 14
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 5 of 14
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 5 of 14
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39,...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack. This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1,...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |