Synology-SA-22:08 ISC BIND
Publish Time: 2022-05-20 11:36:27 UTC+8
Last Updated: 2022-05-20 11:36:27 UTC+8
- Severity
- Not affected
- Status
- Resolved
Abstract
None of Synology's products are affected by CVE-2022-1183 as this vulnerability only affect ISC BIND 9.18.0 and later.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DNS Server for DSM 7.1 | Not affected | N/A |
DNS Server for DSM 7.0 | Not affected | N/A |
DNS Server for DSM 6.2 | Not affected | N/A |
DNS Server for SRM 1.2 | Not affected | N/A |
Mitigation
None
Detail
- CVE-2022-1183
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Reference
- ISC Releases Security Advisory for BIND
- CVE-2022-1183: Destroying a TLS session early causes assertion failure
- CVE-2022-1183
Revision
Revision | Date | Description |
---|---|---|
1 | 2022-05-20 | Initial public release. |