A flaw in the networking code handling DNS-over-TLS queries may cause named to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9-dev"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9-dnsutils"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9-host"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9-libs"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9-utils"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "bind9utils"
},
{
"binary_version": "1:9.18.12-0ubuntu0.22.04.3",
"binary_name": "dnsutils"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9-dev"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9-dnsutils"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9-host"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9-libs"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9-utils"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "bind9utils"
},
{
"binary_version": "1:9.18.18-0ubuntu2",
"binary_name": "dnsutils"
}
]
}