On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
References
Link | Resource |
---|---|
https://kb.isc.org/docs/cve-2022-1183 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220707-0002/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: isc
Published: 2022-05-18T00:00:00
Updated: 2022-07-07T14:07:24
Reserved: 2022-03-30T00:00:00
Link: CVE-2022-1183
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-19T10:15:09.413
Modified: 2022-10-07T15:26:26.393
Link: CVE-2022-1183
JSON object: View
Redhat Information
No data.
CWE