vulnerability
Arch Linux: Denial of service (CVE-2022-0396)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Mar 23, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Mar 23, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
ISC recently discovered an issue in BIND that allows TCP connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This issue is present in BIND 9.16.11 to 9.16.26 (including S editions), and 9.18.0.
This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block; any hosts which are specified within it will be able to trigger this issue on affected versions. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block; any hosts which are specified within it will be able to trigger this issue on affected versions. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
Solution
arch-linux-upgrade-latest
References
- CVE-2022-0396
- https://attackerkb.com/topics/CVE-2022-0396
- URL-https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- URL-https://kb.isc.org/v1/docs/cve-2022-0396
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
- URL-https://security.archlinux.org/ASA-202204-5
- URL-https://security.gentoo.org/glsa/202210-25
- URL-https://security.netapp.com/advisory/ntap-20220408-0001/
- CWE-404
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.