Serious BIND 9 Vulnerabilities Patched


The ISC advises upgrading now.

The Internet Systems Consortium (ISC) has released updates to address two serious vulnerabilities in the widely deployed BIND DNS server, reports Dennis Fisher.

“The first vulnerability (CVE-2023-3341) is in the portion of BIND that processes control channel messages. In some cases, that code can exhaust all of the available stack memory, which would force named to exit,” says Fisher. The second flaw (CVE-2023-4236) relates to code that handles DNS-over-TLS requests.

See details at Decipher.


comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=