Search CVE reports
1 – 10 of 161 results
Some fixes available 1 of 6
A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 1 of 6
Authenticated query containing a TKEY record may cause named to terminate unexpectedly
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 1 of 6
Memory leak in code preparing DNSSEC proofs of non-existence
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 3 of 12
Excessive NSEC3 iterations cause high CPU load during insecure delegation validation
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Needs evaluation | Needs evaluation |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |
Some fixes available 5 of 14
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 5 of 14
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
Some fixes available 5 of 14
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39,...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Fixed | Fixed | Fixed | Vulnerable |
| isc-dhcp | Needs evaluation | Not affected | Not affected | Needs evaluation |
| bind9-libs | Not in release | Needs evaluation | Needs evaluation | — |
A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) options may be vulnerable to a cache-poisoning attack. This issue affects BIND 9 versions 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.37-S1,...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a...
3 affected packages
bind9, isc-dhcp, bind9-libs
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| bind9 | Not affected | Not affected | Not affected | Not affected |
| isc-dhcp | Not affected | Not affected | Not affected | Not affected |
| bind9-libs | Not in release | Not affected | Not affected | — |