BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Solution:
Workaround:
The product does not release or incorrectly releases a resource before it is made available for re-use.
Link | Tags |
---|---|
https://kb.isc.org/v1/docs/cve-2022-0396 | mitigation vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/ | mailing list third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20220408-0001/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf | third party advisory patch |
https://security.gentoo.org/glsa/202210-25 | third party advisory vendor advisory |