Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-35134 | An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service. |
![]() |
USN-5626-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.7 or BIND 9.19.5.
Workaround
There are no known workarounds. TKEY record processing in GSS-TSIG mode is not affected by this defect. The memory leak impacts authoritative DNS server TKEY record processing only. Client processing (resolver functions) do not trigger this defect.
Wed, 28 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T15:25:56.879Z
Reserved: 2022-08-19T00:00:00.000Z
Link: CVE-2022-2906

Updated: 2024-08-03T00:52:59.888Z

Status : Modified
Published: 2022-09-21T11:15:09.620
Modified: 2025-05-28T16:15:23.157
Link: CVE-2022-2906


No data.