bind9 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the bind9 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
CVE-2024-1975

<1:9.20.0-1
  • L
CVE-2024-4076

<1:9.20.0-1
  • H
CVE-2024-0760

<1:9.20.0-1
  • H
CVE-2024-1737

<1:9.20.0-1
  • L
CVE-2023-50868

<1:9.19.21-1
  • H
Allocation of Resources Without Limits or Throttling

<1:9.19.21-1
  • H
CVE-2023-6516

<1:9.17.19-1
  • H
CVE-2023-4408

<1:9.19.21-1
  • H
CVE-2023-5517

<1:9.19.21-1
  • H
CVE-2023-5679

<1:9.19.21-1
  • H
Out-of-bounds Write

<1:9.19.17-1
  • H
Reachable Assertion

<1:9.19.17-1
  • H
Allocation of Resources Without Limits or Throttling

<1:9.18.16-1
  • H
Out-of-bounds Write

<1:9.18.16-1
  • H
Reachable Assertion

<1:9.18.11-1
  • H
Use After Free

<1:9.18.11-1
  • H
CVE-2022-3736

<1:9.18.11-1
  • H
Memory Leak

<1:9.18.7-1
  • H
Memory Leak

<1:9.18.7-1
  • H
Memory Leak

<1:9.17.20-1
  • M
CVE-2022-2795

<1:9.18.7-1
  • H
CVE-2022-3080

<1:9.18.7-1
  • H
Out-of-bounds Read

<1:9.18.7-1
  • H
Reachable Assertion

<1:9.18.3-1
  • H
Reachable Assertion

<1:9.18.1-1
  • H
Reachable Assertion

<1:9.18.1-1
  • M
Improper Resource Shutdown or Release

<1:9.18.1-1
  • M
HTTP Request Smuggling

<1:9.18.1-1
  • M
CVE-2021-25219

<1:9.17.19-1
  • H
Reachable Assertion

<1:9.16.15-1
  • M
Reachable Assertion

<1:9.16.15-1
  • C
Reachable Assertion

<1:9.16.15-1
  • H
Buffer Overflow

<1:9.16.12-1
  • M
Improper Privilege Management

<1:9.16.6-1
  • M
Reachable Assertion

<1:9.16.6-1
  • H
Improper Privilege Management

<1:9.16.6-1
  • H
Improper Input Validation

<1:9.16.6-1
  • H
Reachable Assertion

<1:9.16.6-1
  • M
Improper Resource Shutdown or Release

<1:9.16.4-1
  • M
Reachable Assertion

<1:9.16.4-1
  • M
Reachable Assertion

<1:9.16.3-1
  • H
Resource Exhaustion

<1:9.16.3-1
  • H
Resource Exhaustion

<1:9.11.14+dfsg-1
  • M
Race Condition

<1:9.11.5.P4+dfsg-5.1
  • H
Allocation of Resources Without Limits or Throttling

<1:9.11.5.P4+dfsg-4
  • H
Missing Release of Resource after Effective Lifetime

<1:9.11.5.P4+dfsg-1
  • L
Incorrect Permission Assignment for Critical Resource

<1:9.11.5.P4+dfsg-1
  • L
Use of a Broken or Risky Cryptographic Algorithm

<1:9.11.5.P4+dfsg-1
  • L
Incorrect Authorization

<1:9.11.5+dfsg-1
  • H
Reachable Assertion

<1:9.11.4.P1+dfsg-1
  • H
Use After Free

<1:9.11.2.P1-1
  • H
Reachable Assertion

<1:9.10.3.dfsg.P4-12.3
  • H
Reachable Assertion

<1:9.9.3.dfsg.P2-1
  • M
NULL Pointer Dereference

<1:9.10.3.dfsg.P4-12
  • M
Reachable Assertion

<1:9.10.3.dfsg.P4-12.3
  • L
Improper Input Validation

<1:9.10.3.dfsg.P4-12.4
  • M
CVE-2017-3143

<1:9.10.3.dfsg.P4-12.4
  • H
Information Exposure

<1:9.11.3+dfsg-2
  • M
Reachable Assertion

<1:9.10.3.dfsg.P4-12.3
  • H
Improper Input Validation

<1:9.10.3.dfsg.P4-11
  • H
Improper Input Validation

<1:9.10.3.dfsg.P4-11
  • H
Improper Input Validation

<1:9.10.3.dfsg.P4-11
  • H
Reachable Assertion

<1:9.10.3.dfsg.P4-11
  • H
Improper Input Validation

<1:9.9.3.dfsg.P2-1
  • H
Improper Input Validation

<1:9.10.3.dfsg.P4-11
  • M
Improper Input Validation

<1:9.10.3.dfsg.P4-11
  • L
Improper Input Validation

<1:9.10.6+dfsg-1
  • H
Improper Input Validation

<1:9.10.3.dfsg.P4-6
  • M
Improper Input Validation

<1:9.10.3.dfsg.P4-6
  • M
Improper Input Validation

<1:9.10.3.dfsg.P4-6
  • M
Improper Input Validation

<1:9.9.5.dfsg-12.1
  • H
Improper Input Validation

<1:9.9.5.dfsg-12
  • H
Improper Data Handling

<1:9.9.5.dfsg-11
  • H
Code

<1:9.9.5.dfsg-10
  • L
Resource Management Errors

<1:9.9.5.dfsg-9
  • H
Resource Management Errors

<1:9.9.5.dfsg-7
  • L
Out-of-Bounds

<1:9.9.5.dfsg-2
  • H
CVE-2013-4854

<1:9.8.4.dfsg.P1-6+nmu3
  • H
Out-of-Bounds

<1:9.8.4.dfsg.P1-6+nmu1
  • M
Improper Input Validation

<1:9.8.4.dfsg.P1-6+nmu1
  • H
Improper Input Validation

<1:9.8.4.dfsg.P1-1
  • H
Numeric Errors

<1:9.8.1.dfsg.P1-4.3
  • H
CVE-2012-4244

<1:9.8.4.dfsg-1
  • H
Improper Input Validation

<1:9.8.1.dfsg.P1-4.2
  • H
Numeric Errors

<1:9.8.1.dfsg.P1-4.1
  • L
CVE-2012-1033

<1:9.8.1.dfsg.P1-4.1
  • H
CVE-2011-4313

<1:9.8.1.dfsg.P1-1
  • H
CVE-2011-2464

<1:9.8.1.dfsg-1
  • L
CVE-2011-2465

<1:9.8.1.dfsg.P1-1
  • H
Numeric Errors

<1:9.8.1.dfsg-1
  • M
Resource Management Errors

<1:9.8.1.dfsg.P1-1
  • M
Resource Management Errors

<1:9.7.3.dfsg-1
  • M
Access Restriction Bypass

<1:9.7.2.dfsg.P3-1
  • M
Access Restriction Bypass

<1:9.7.2.dfsg.P3-1
  • M
Improper Input Validation

<1:9.7.2.dfsg.P3-1
  • M
Improper Input Validation

<1:9.7.2.dfsg.P2-1
  • L
Improper Data Handling

<9.7.1.dfsg.P2
  • H
CVE-2010-0382

<1:9.7.0.dfsg-1
  • M
CVE-2010-0290

<1:9.7.0.dfsg-1
  • M
Improper Input Validation

<1:9.7.0.dfsg-1
  • M
CVE-2009-4022

<1:9.6.1.dfsg.P2-1
  • H
Configuration

<1:9.6.1.dfsg.P1-1
  • L
Improper Authentication

<1:9.5.1.dfsg.P1-1
  • H
Insufficient Entropy

<1:9.5.0.dfsg-5
  • M
CVE-2007-2926

<1:9.4.1-P1-1
  • M
CVE-2007-2925

<1:9.4.1-P1-1
  • M
CVE-2007-2241

<1:9.4.1-1
  • M
CVE-2007-0493

<1:9.3.4-2
  • M
Improper Data Handling

<1:9.3.4-2
  • M
CVE-2006-4095

<1:9.3.2-P1-1
  • M
CVE-2006-4096

<1:9.3.2-P1-1
  • L
CVE-2006-2073

<1:9.3.3-1
  • L
CVE-2006-0987

<1:9.4.0-1
  • M
CVE-2005-0034

<1:9.3.1