{"id":"CVE-2023-5517","details":"A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:\n\n  - `nxdomain-redirect \u003cdomain\u003e;` is configured, and\n  - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.\nThis issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.","modified":"2026-03-20T12:38:56.692132Z","published":"2024-02-13T14:15:45.510Z","related":["ALSA-2024:1781","ALSA-2024:1789","ALSA-2024:2551","CGA-8vch-v4ff-2q2m","MGASA-2024-0038","SUSE-SU-2024:0574-1","SUSE-SU-2024:0590-1","SUSE-SU-2024:1982-1","SUSE-SU-2024:2033-1","openSUSE-SU-2024:13687-1"],"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2024/02/13/1"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/cve-2023-5517"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240503-0006/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"71a40862c0be867999867cd99e21c2266a5e452b"},{"last_affected":"353fb4b9d32dba44574853568c749c6032a5554e"},{"introduced":"8db45afa1affcb823e68afdeddedf93e136f5d3e"},{"last_affected":"cb6cff65a928fd38bf29060d7810fa3be0aa091e"},{"introduced":"cab15392afd841fe3b0bacd894003376d857459a"},{"last_affected":"18a05caf55e019c7ddf491d7d78c51eebb993133"}],"database_specific":{"versions":[{"introduced":"9.12.0"},{"last_affected":"9.16.45"},{"introduced":"9.18.0"},{"last_affected":"9.18.21"},{"introduced":"9.19.0"},{"last_affected":"9.19.19"}]}}],"versions":["v9.18.0","v9.18.10","v9.18.11","v9.18.12","v9.18.13","v9.18.14","v9.18.15","v9.18.16","v9.18.17","v9.18.18","v9.18.19","v9.18.2","v9.18.20","v9.18.21","v9.18.3","v9.18.4","v9.18.5","v9.18.6","v9.18.7","v9.18.8","v9.18.9","v9.19.0","v9.19.1","v9.19.10","v9.19.11","v9.19.12","v9.19.13","v9.19.14","v9.19.15","v9.19.16","v9.19.17","v9.19.18","v9.19.19","v9.19.2","v9.19.3","v9.19.4","v9.19.5","v9.19.6","v9.19.7","v9.19.8","v9.19.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.8-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.11-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.12-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.13-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.14-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.21-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.32-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.36-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.43-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.45-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.18.11-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.18.18-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.18.21-s1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5517.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}