Related Vulnerabilities: CVE-2022-1183  

An assertion failure can be triggered if a TLS connection to a configured http TLS listener with a defined endpoint is destroyed too early. On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected.

Severity High

Remote Yes

Type Incorrect calculation

Description

An assertion failure can be triggered if a TLS connection to a configured http TLS listener with a defined endpoint is destroyed too early.

On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected.

AVG-2727 bind 9.18.2-1 9.18.3-1 High Vulnerable

https://kb.isc.org/v1/docs/cve-2022-1183

Arch Linux's default configuration is not vulnerable.