CVE Vulnerabilities

CVE-2023-5679

Published: Feb 13, 2024 | Modified: Oct 22, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

A bad interaction between DNS64 and serve-stale may cause named to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

Affected Software

Name Vendor Start Version End Version
Active_iq_unified_manager Netapp - (including) - (including)
Fedora Fedoraproject 38 (including) 38 (including)
Fedora Fedoraproject 39 (including) 39 (including)
Red Hat Enterprise Linux 8 RedHat bind9.16-32:9.16.23-0.16.el8_9.2 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat bind9.16-32:9.16.23-0.7.el8_6.5 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat bind9.16-32:9.16.23-0.14.el8_8.4 *
Red Hat Enterprise Linux 9 RedHat bind-32:9.16.23-14.el9_3.4 *
Red Hat Enterprise Linux 9 RedHat bind-dyndb-ldap-0:11.9-8.el9_3.3 *
Red Hat Enterprise Linux 9 RedHat bind-32:9.16.23-18.el9_4.1 *
Red Hat Enterprise Linux 9 RedHat bind-dyndb-ldap-0:11.9-9.el9_4 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat bind-32:9.16.23-1.el9_0.5 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat bind-dyndb-ldap-0:11.9-7.el9_0.1 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat bind-32:9.16.23-11.el9_2.4 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat bind-dyndb-ldap-0:11.9-8.el9_2.2 *
Bind9 Ubuntu bionic *
Bind9 Ubuntu devel *
Bind9 Ubuntu jammy *
Bind9 Ubuntu mantic *
Bind9 Ubuntu noble *
Bind9 Ubuntu oracular *
Bind9 Ubuntu trusty *
Bind9 Ubuntu upstream *
Bind9 Ubuntu xenial *

References