First published: Wed Sep 21 2022(Updated: )
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <32:9.11.4-26.P2.el7_9.10 | 32:9.11.4-26.P2.el7_9.10 |
redhat/bind | <32:9.11.36-3.el8_6.1 | 32:9.11.36-3.el8_6.1 |
redhat/bind9.16 | <32:9.16.23-0.7.el8_6.1 | 32:9.16.23-0.7.el8_6.1 |
redhat/bind | <32:9.11.4-26.P2.el8_1.6 | 32:9.11.4-26.P2.el8_1.6 |
redhat/bind | <32:9.11.13-6.el8_2.4 | 32:9.11.13-6.el8_2.4 |
redhat/bind | <32:9.11.26-4.el8_4.1 | 32:9.11.26-4.el8_4.1 |
redhat/bind | <32:9.16.23-1.el9_0.1 | 32:9.16.23-1.el9_0.1 |
debian/bind9 | <=1:9.11.5.P4+dfsg-5.1+deb10u7 | 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 |
redhat/bind | <9.16.33 | 9.16.33 |
ISC BIND | >=9.8.4<=9.16.32 | |
Isc Bind Supported Preview | =9.9.3-s1 | |
ISC BIND | =9.9.3-s1 | |
ISC BIND | =9.9.12-s1 | |
ISC BIND | =9.9.13-s1 | |
ISC BIND | =9.10.5-s1 | |
ISC BIND | =9.10.7-s1 | |
ISC BIND | =9.11.3-s1 | |
Isc Bind Supported Preview | =9.11.5-s3 | |
ISC BIND | =9.11.5-s3 | |
ISC BIND | =9.11.5-s5 | |
ISC BIND | =9.11.5-s6 | |
ISC BIND | =9.11.6-s1 | |
ISC BIND | =9.11.7-s1 | |
ISC BIND | =9.11.8-s1 | |
ISC BIND | =9.11.12-s1 | |
ISC BIND | =9.11.14-s1 | |
ISC BIND | =9.11.19-s1 | |
ISC BIND | =9.11.21-s1 | |
ISC BIND | =9.11.27-s1 | |
ISC BIND | =9.11.29-s1 | |
ISC BIND | =9.11.35-s1 | |
ISC BIND | =9.11.37-s1 | |
ISC BIND | =9.16.8-s1 | |
ISC BIND | =9.16.11-s1 | |
ISC BIND | =9.16.13-s1 | |
ISC BIND | =9.16.21-s1 | |
ISC BIND | =9.16.32-s1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Netapp Active Iq Unified Manager Vmware Vsphere |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in the Bind package is CVE-2022-38177.
The severity rating of CVE-2022-38177 is high, with a value of 7.5.
CVE-2022-38177 allows an attacker to trigger a small memory leak, potentially causing named to crash.
Software versions up to and excluding 9.16.33 of the Bind package are affected by CVE-2022-38177.
You can find more information about CVE-2022-38177 in the references provided: [link1] [link2] [link3].