{"id":"CVE-2022-0635","details":"Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.","modified":"2026-04-11T17:20:02.795666Z","published":"2022-03-23T12:15:07.707Z","related":["openSUSE-SU-2024:12081-1"],"references":[{"type":"ADVISORY","url":"https://kb.isc.org/v1/docs/cve-2022-0635"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220408-0001/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"0"},{"last_affected":"8db45afa1affcb823e68afdeddedf93e136f5d3e"}],"database_specific":{"cpe":"cpe:2.3:a:isc:bind:9.18.0:*:*:*:-:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"9.18.0"}]}}],"versions":["v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.13.0","v9.13.2","v9.13.3","v9.13.4","v9.13.5","v9.13.6","v9.15.0","v9.15.2","v9.15.3","v9.15.4","v9.15.7","v9.15.8","v9.18.0","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.7.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0635.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}