First published: Wed Sep 21 2022(Updated: )
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <32:9.11.4-26.P2.el7_9.10 | 32:9.11.4-26.P2.el7_9.10 |
redhat/bind | <32:9.11.36-3.el8_6.1 | 32:9.11.36-3.el8_6.1 |
redhat/bind9.16 | <32:9.16.23-0.7.el8_6.1 | 32:9.16.23-0.7.el8_6.1 |
redhat/bind | <32:9.11.4-26.P2.el8_1.6 | 32:9.11.4-26.P2.el8_1.6 |
redhat/bind | <32:9.11.13-6.el8_2.4 | 32:9.11.13-6.el8_2.4 |
redhat/bind | <32:9.11.26-4.el8_4.1 | 32:9.11.26-4.el8_4.1 |
redhat/bind | <32:9.16.23-1.el9_0.1 | 32:9.16.23-1.el9_0.1 |
debian/bind9 | <=1:9.11.5.P4+dfsg-5.1+deb10u7 | 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 |
redhat/bind | <9.16.33 | 9.16.33 |
redhat/bind | <9.18.7 | 9.18.7 |
redhat/bind | <9.19.5 | 9.19.5 |
ISC BIND | >=9.9.12<=9.9.13 | |
ISC BIND | >=9.10.7<=9.10.8 | |
ISC BIND | >=9.11.3<=9.16.32 | |
ISC BIND | =9.11.3-s1 | |
ISC BIND | =9.11.3-s4 | |
Isc Bind Supported Preview | =9.11.5-s3 | |
ISC BIND | =9.11.5-s3 | |
ISC BIND | =9.11.5-s5 | |
ISC BIND | =9.11.5-s6 | |
ISC BIND | =9.11.6-s1 | |
ISC BIND | =9.11.7-s1 | |
ISC BIND | =9.11.8-s1 | |
ISC BIND | =9.11.12-s1 | |
ISC BIND | =9.11.14-s1 | |
ISC BIND | =9.11.19-s1 | |
ISC BIND | =9.11.21-s1 | |
ISC BIND | =9.11.27-s1 | |
ISC BIND | =9.11.29-s1 | |
ISC BIND | =9.11.35-s1 | |
ISC BIND | =9.11.37-s1 | |
ISC BIND | =9.16.8-s1 | |
ISC BIND | =9.16.11-s1 | |
ISC BIND | =9.16.13-s1 | |
ISC BIND | =9.16.21-s1 | |
ISC BIND | =9.16.32-s1 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Netapp Active Iq Unified Manager Vmware Vsphere |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-38178 is a vulnerability in the Bind package that allows an attacker to trigger a small memory leak by spoofing the target resolver with responses that have a malformed EdDSA signature.
CVE-2022-38178 has a severity rating of 7.5 (high).
The Bind package versions 9.16.33, 9.18.7, and 9.19.5 are affected by CVE-2022-38178. Additionally, some versions of ISC BIND and other software packages are also affected.
To fix the CVE-2022-38178 vulnerability, it is recommended to update to the following versions: Bind package - 9.16.44-1~deb11u1, 9.18.19-1~deb12u1, or 9.19.17-1; ISC BIND - 9.11.5.P4+dfsg-5.1+deb10u9. Check the vendor's website for official patches and updates.
You can find more information about CVE-2022-38178 on the Red Hat Bugzilla pages (bugzilla.redhat.com) and the Red Hat Security Advisory (access.redhat.com/errata/RHSA-2022:6763).