Synology Security Advisory 22:08 Concerning Resolved ISC BIND Vulnerability
None products are affected by CVE-2022-1183 as this vulnerability only affect ISC BIND 9.18.0 and later
This is a Press Release edited by StorageNewsletter.com on May 30, 2022 at 2:01 pmSynology, Inc. had published a security advisory concerning the vulnerability only affect ISC BIND 9.18.0 and later.
Publish time: 2022-05-20 11:36:27 UTC+8
Last updated: 2022-05-20 11:36:27 UTC+8
Severity: Not affected
Status: Resolved
Abstract
None of Synology’s products are affected by CVE-2022-1183 as this vulnerability only affect ISC BIND 9.18.0 and later.
Affected products
Mitigation : None
Detail :
-
CVE-2022-1183
-
Severity: Not affected
-
CVSS3 Base Score: 0.0
-
CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
-
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
-
Reference
Revision