{"id":"CVE-2022-3080","details":"By sending specific queries to the resolver, an attacker can cause named to crash.","modified":"2026-04-02T07:58:13.930716Z","published":"2022-09-21T11:15:09.787Z","related":["ALSA-2022:6763","ALSA-2022:6781","CGA-58m8-gfvm-mv5m","SUSE-SU-2022:3767-1","openSUSE-SU-2024:12356-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240621-0002/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5235"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-25"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/09/21/3"},{"type":"FIX","url":"https://kb.isc.org/docs/cve-2022-3080"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"0"},{"fixed":"35e9c6e31dd742f501624a31c3326db1c7b460fe"},{"introduced":"8db45afa1affcb823e68afdeddedf93e136f5d3e"},{"fixed":"85a6eb108e884467c4b3af414140d6b033a89a62"},{"introduced":"cab15392afd841fe3b0bacd894003376d857459a"},{"fixed":"5b2fed25f4f7d2c08b38c4d94193715cdbb2e038"}],"database_specific":{"versions":[{"introduced":"9.16.14"},{"fixed":"9.16.33"},{"introduced":"9.18.0"},{"fixed":"9.18.7"},{"introduced":"9.19.0"},{"fixed":"9.19.5"}]}}],"versions":["v9.0.0","v9.0.0a1","v9.0.0a2","v9.0.0a3","v9.0.0b1","v9.0.0b2","v9.0.0b3","v9.0.0b4","v9.0.0b5","v9.0.0rc1","v9.0.0rc2","v9.0.0rc3","v9.0.0rc4","v9.0.0rc5","v9.0.0rc6","v9.0.1","v9.0.1rc1","v9.0.1rc2","v9.1.0","v9.1.0b1","v9.1.0b2","v9.1.0b3","v9.1.0rc1","v9.1.1","v9.1.1-P1","v9.1.1-P2","v9.1.1-P3","v9.1.1-P4","v9.1.1rc1","v9.1.1rc2","v9.1.1rc3","v9.1.1rc4","v9.1.1rc5","v9.1.1rc6","v9.1.1rc7","v9.1.2","v9.1.2rc1","v9.1.3","v9.1.3-P1","v9.1.3-P2","v9.1.3-P3","v9.1.3rc1","v9.1.3rc2","v9.1.3rc3","v9.10.0","v9.10.0-P1","v9.10.0-P2","v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.10.0rc2","v9.10.1","v9.10.1-P1","v9.10.1-P2","v9.10.1b1","v9.10.1b2","v9.10.1rc1","v9.10.1rc2","v9.10.2","v9.10.2-P1","v9.10.2-P2","v9.10.2-P3","v9.10.2-P4","v9.10.2b1","v9.10.2rc1","v9.10.2rc2","v9.10.3","v9.10.3-P2","v9.10.3-P3","v9.10.3-P4","v9.10.3b1","v9.10.3rc1","v9.10.4","v9.10.4-P1","v9.10.4-P2","v9.10.4-P3","v9.10.4-P4","v9.10.4-P5","v9.10.4-P6","v9.10.4-P8","v9.10.4b1","v9.10.4b2","v9.10.4b3","v9.10.4rc1","v9.10.5","v9.10.5-P1","v9.10.5-P2","v9.10.5-P3","v9.10.5b1","v9.10.5rc1","v9.10.5rc2","v9.10.5rc3","v9.10.6","v9.10.6-P1","v9.10.6b1","v9.10.6rc1","v9.10.6rc2","v9.10.7","v9.10.7b1","v9.10.7rc1","v9.10.8","v9.10.8rc1","v9.10.8rc2","v9.11.0","v9.11.0-P1","v9.11.0-P2","v9.11.0-P3","v9.11.0-P5","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.11.0b1","v9.11.0b2","v9.11.0b3","v9.11.0rc1","v9.11.0rc2","v9.11.0rc3","v9.11.1","v9.11.1-P1","v9.11.1-P2","v9.11.1-P3","v9.11.10","v9.11.11","v9.11.12","v9.11.13","v9.11.14","v9.11.15","v9.11.16","v9.11.17","v9.11.18","v9.11.19","v9.11.1b1","v9.11.1rc1","v9.11.1rc2","v9.11.1rc3","v9.11.2","v9.11.2-P1","v9.11.20","v9.11.21","v9.11.22","v9.11.23","v9.11.24","v9.11.25","v9.11.26","v9.11.27","v9.11.28","v9.11.29","v9.11.2b1","v9.11.2rc1","v9.11.2rc2","v9.11.3","v9.11.31","v9.11.32","v9.11.33","v9.11.34","v9.11.35","v9.11.36","v9.11.37","v9.11.3b1","v9.11.3rc1","v9.11.4","v9.11.4-P1","v9.11.4-P2","v9.11.4rc1","v9.11.4rc2","v9.11.5","v9.11.5-P1","v9.11.5-P4","v9.11.5rc1","v9.11.6","v9.11.6-P1","v9.11.6rc1","v9.11.7","v9.11.8","v9.11.9","v9.12.0","v9.12.0a0","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.12.0rc2","v9.12.0rc3","v9.12.1","v9.12.1-P2","v9.12.1b1","v9.12.1rc1","v9.12.2","v9.12.2-P1","v9.12.2-P2","v9.12.2rc1","v9.12.2rc2","v9.12.3","v9.12.3-P1","v9.12.3-P4","v9.12.3rc1","v9.12.4","v9.12.4-P1","v9.12.4rc1","v9.13.0","v9.13.1","v9.13.2","v9.13.3","v9.13.4","v9.13.5","v9.13.5-W1","v9.13.6","v9.13.7","v9.14.0","v9.14.0rc1","v9.14.0rc2","v9.14.0rc3","v9.14.1","v9.14.10","v9.14.11","v9.14.12","v9.14.2","v9.14.3","v9.14.4","v9.14.5","v9.14.6","v9.14.7","v9.14.8","v9.14.9","v9.15.0","v9.15.1","v9.15.2","v9.15.3","v9.15.4","v9.15.5","v9.15.6","v9.15.7","v9.15.8","v9.16.0","v9.16.1","v9.16.10","v9.16.11","v9.16.12","v9.16.13","v9.16.15","v9.16.16","v9.16.17","v9.16.18","v9.16.19","v9.16.2","v9.16.20","v9.16.21","v9.16.22","v9.16.23","v9.16.24","v9.16.25","v9.16.26","v9.16.27","v9.16.28","v9.16.29","v9.16.3","v9.16.30","v9.16.31","v9.16.32","v9.16.4","v9.16.5","v9.16.6","v9.16.7","v9.16.8","v9.16.9","v9.17.0","v9.17.1","v9.17.10","v9.17.11","v9.17.12","v9.17.13","v9.17.14","v9.17.15","v9.17.16","v9.17.17","v9.17.18","v9.17.19","v9.17.2","v9.17.20","v9.17.21","v9.17.22","v9.17.3","v9.17.4","v9.17.5","v9.17.6","v9.17.7","v9.17.8","v9.17.9","v9.18.0","v9.18.1","v9.18.2","v9.18.3","v9.18.4","v9.18.5","v9.18.6","v9.19.0","v9.19.1","v9.19.2","v9.19.3","v9.19.4","v9.2.0","v9.2.0-P1","v9.2.0-P2","v9.2.0a1","v9.2.0a2","v9.2.0a3","v9.2.0b1","v9.2.0b2","v9.2.0rc1","v9.2.0rc10","v9.2.0rc2","v9.2.0rc3","v9.2.0rc4","v9.2.0rc5","v9.2.0rc6","v9.2.0rc7","v9.2.0rc8","v9.2.0rc9","v9.2.1","v9.2.1-P1","v9.2.1rc1","v9.2.1rc2","v9.2.2","v9.2.2-P1","v9.2.2-P2","v9.2.2-P3","v9.2.2rc1","v9.2.3","v9.2.3rc1","v9.2.3rc2","v9.2.3rc3","v9.2.3rc4","v9.2.4","v9.2.4rc1","v9.2.4rc2","v9.2.4rc3","v9.2.4rc4","v9.2.4rc5","v9.2.4rc6","v9.2.4rc7","v9.2.4rc8","v9.2.5","v9.2.5rc1","v9.2.6","v9.2.6-P1","v9.2.6-P2","v9.2.6b1","v9.2.6b2","v9.2.6rc1","v9.2.7","v9.2.7b1","v9.2.7rc1","v9.2.7rc2","v9.2.7rc3","v9.2.8","v9.2.8-P1","v9.2.9","v9.2.9b1","v9.2.9rc1","v9.3.0","v9.3.0rc1","v9.3.0rc2","v9.3.0rc3","v9.3.0rc4","v9.3.1","v9.3.1rc1","v9.3.2","v9.3.2-P1","v9.3.2-P2","v9.3.2b1","v9.3.2b2","v9.3.2rc1","v9.3.3","v9.3.3b1","v9.3.3rc1","v9.3.3rc2","v9.3.3rc3","v9.3.4","v9.3.4-P1","v9.3.5","v9.3.5-P1","v9.3.5-P2","v9.3.5-P2-W1","v9.3.5-P2-W2","v9.3.5b1","v9.3.5rc1","v9.3.5rc2","v9.3.6","v9.3.6-P1","v9.3.6-P2","v9.3.6b1","v9.3.6rc1","v9.4-ESV","v9.4-ESV-R1","v9.4-ESV-R2","v9.4-ESV-R3","v9.4-ESV-R4","v9.4-ESV-R4-P1","v9.4-ESV-R5","v9.4-ESV-R5-P1","v9.4-ESV-R5b1","v9.4-ESV-R5rc1","v9.4-ESVb1","v9.4-ESVrc1","v9.4.0","v9.4.0a1","v9.4.0a2","v9.4.0a3","v9.4.0a4","v9.4.0a5","v9.4.0a6","v9.4.0b1","v9.4.0b2","v9.4.0b3","v9.4.0b4","v9.4.0rc1","v9.4.0rc2","v9.4.1","v9.4.1-P1","v9.4.2","v9.4.2-P1","v9.4.2-P2","v9.4.2-P2-W1","v9.4.2-P2-W2","v9.4.2b1","v9.4.2rc1","v9.4.2rc2","v9.4.3","v9.4.3-P1","v9.4.3-P2","v9.4.3-P3","v9.4.3-P4","v9.4.3-P5","v9.4.3b1","v9.4.3b2","v9.4.3b3","v9.4.3rc1","v9.4.4b1","v9.5.0","v9.5.0-P1","v9.5.0-P2","v9.5.0-P2-W1","v9.5.0-P2-W2","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.5.0a7","v9.5.0b1","v9.5.0b2","v9.5.0b3","v9.5.0rc1","v9.5.1","v9.5.1-P1","v9.5.1-P2","v9.5.1-P3","v9.5.1b1","v9.5.1b2","v9.5.1b3","v9.5.1rc1","v9.5.1rc2","v9.5.2","v9.5.2-P1","v9.5.2-P2","v9.5.2-P3","v9.5.2-P4","v9.5.2b1","v9.5.2rc1","v9.5.3b1","v9.5.3rc1","v9.6-ESV","v9.6-ESV-R1","v9.6-ESV-R10","v9.6-ESV-R10-P1","v9.6-ESV-R10b1","v9.6-ESV-R10rc1","v9.6-ESV-R10rc2","v9.6-ESV-R11","v9.6-ESV-R11b1","v9.6-ESV-R11rc1","v9.6-ESV-R11rc2","v9.6-ESV-R2","v9.6-ESV-R3","v9.6-ESV-R4","v9.6-ESV-R4-P1","v9.6-ESV-R4-P2","v9.6-ESV-R4-P3","v9.6-ESV-R5","v9.6-ESV-R5-P1","v9.6-ESV-R5b1","v9.6-ESV-R5rc1","v9.6-ESV-R6","v9.6-ESV-R6b1","v9.6-ESV-R6rc1","v9.6-ESV-R6rc2","v9.6-ESV-R7","v9.6-ESV-R7-P1","v9.6-ESV-R7-P2","v9.6-ESV-R7-P3","v9.6-ESV-R7-P4","v9.6-ESV-R8","v9.6-ESV-R8b1","v9.6-ESV-R9","v9.6-ESV-R9-P1","v9.6-ESV-R9b1","v9.6-ESV-R9b2","v9.6-ESV-R9rc1","v9.6-ESV-R9rc2","v9.6.0","v9.6.0-P1","v9.6.0a1","v9.6.0b1","v9.6.0rc1","v9.6.0rc2","v9.6.1","v9.6.1-P1","v9.6.1-P2","v9.6.1-P3","v9.6.1b1","v9.6.1rc1","v9.6.2","v9.6.2-P1","v9.6.2-P2","v9.6.2-P3","v9.6.2b1","v9.6.2rc1","v9.6.3","v9.6.3b1","v9.6.3rc1","v9.7.0","v9.7.0-P1","v9.7.0-P2","v9.7.0a1","v9.7.0a2","v9.7.0a3","v9.7.0b1","v9.7.0b2","v9.7.0b3","v9.7.0rc1","v9.7.0rc2","v9.7.1","v9.7.1-P1","v9.7.1-P2","v9.7.1b1","v9.7.1rc1","v9.7.2","v9.7.2-P1","v9.7.2-P2","v9.7.2-P3","v9.7.2b1","v9.7.2rc1","v9.7.3","v9.7.3-P1","v9.7.3-P2","v9.7.3-P3","v9.7.3b1","v9.7.3rc1","v9.7.4","v9.7.4-P1","v9.7.4b1","v9.7.4rc1","v9.7.5","v9.7.5-W1","v9.7.5b1","v9.7.5rc1","v9.7.5rc2","v9.7.6","v9.7.6-P1","v9.7.6-P2","v9.7.6-P3","v9.7.6-P4","v9.7.7","v9.7.7b1","v9.7.7rc1","v9.8.0","v9.8.0-P1","v9.8.0-P2","v9.8.0-P3","v9.8.0-P4","v9.8.0a1","v9.8.0b1","v9.8.0rc1","v9.8.1","v9.8.1-P1","v9.8.1b1","v9.8.1b2","v9.8.1b3","v9.8.1rc1","v9.8.2","v9.8.2-W1","v9.8.2b1","v9.8.2rc1","v9.8.2rc2","v9.8.3","v9.8.3-P1","v9.8.3-P2","v9.8.3-P3","v9.8.3-P4","v9.8.4","v9.8.4-P1","v9.8.4-P2","v9.8.4b1","v9.8.4rc1","v9.8.5","v9.8.5-P1","v9.8.5-P2","v9.8.5b1","v9.8.5b2","v9.8.5rc1","v9.8.5rc2","v9.8.6","v9.8.6-P1","v9.8.6-P2","v9.8.6b1","v9.8.6rc1","v9.8.6rc2","v9.8.7","v9.8.7-P1","v9.8.7-W1","v9.8.7b1","v9.8.7rc1","v9.8.7rc2","v9.8.8","v9.8.8b1","v9.8.8b2","v9.8.8rc1","v9.8.8rc2","v9.8.9-P2","v9.9-ESV-R10-P2","v9.9.0","v9.9.0-W1","v9.9.0a1","v9.9.0a2","v9.9.0a3","v9.9.0b1","v9.9.0b2","v9.9.0rc1","v9.9.0rc2","v9.9.0rc3","v9.9.0rc4","v9.9.1","v9.9.1-P1","v9.9.1-P2","v9.9.1-P3","v9.9.1-P4","v9.9.10","v9.9.10-P1","v9.9.10-P2","v9.9.10-P3","v9.9.10b1","v9.9.10rc1","v9.9.10rc2","v9.9.10rc3","v9.9.11","v9.9.11-P1","v9.9.11b1","v9.9.11rc1","v9.9.11rc2","v9.9.12","v9.9.12b1","v9.9.12rc1","v9.9.13","v9.9.13rc1","v9.9.13rc2","v9.9.2","v9.9.2-P1","v9.9.2-P2","v9.9.2b1","v9.9.2rc1","v9.9.3","v9.9.3-P1","v9.9.3-P2","v9.9.3b1","v9.9.3b2","v9.9.3rc1","v9.9.3rc2","v9.9.4","v9.9.4-P1","v9.9.4-P2","v9.9.4b1","v9.9.4rc1","v9.9.4rc2","v9.9.5","v9.9.5-P1","v9.9.5-W1","v9.9.5b1","v9.9.5rc1","v9.9.5rc2","v9.9.6","v9.9.6-P1","v9.9.6-P2","v9.9.6b1","v9.9.6b2","v9.9.6rc1","v9.9.6rc2","v9.9.7","v9.9.7-P1","v9.9.7-P2","v9.9.7-P3","v9.9.7b1","v9.9.7rc1","v9.9.7rc2","v9.9.8","v9.9.8-P2","v9.9.8-P3","v9.9.8-P4","v9.9.8b1","v9.9.8rc1","v9.9.9","v9.9.9-P1","v9.9.9-P2","v9.9.9-P3","v9.9.9-P4","v9.9.9-P5","v9.9.9-P6","v9.9.9-P8","v9.9.9b1","v9.9.9b2","v9.9.9rc1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.16.14-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.21-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"9.16.32-s1"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3080.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}