An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-35134 An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
Ubuntu USN Ubuntu USN USN-5626-1 Bind vulnerabilities
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.7 or BIND 9.19.5.


Workaround

There are no known workarounds. TKEY record processing in GSS-TSIG mode is not affected by this defect. The memory leak impacts authoritative DNS server TKEY record processing only. Client processing (resolver functions) do not trigger this defect.

History

Wed, 28 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-05-28T15:25:56.879Z

Reserved: 2022-08-19T00:00:00.000Z

Link: CVE-2022-2906

cve-icon Vulnrichment

Updated: 2024-08-03T00:52:59.888Z

cve-icon NVD

Status : Modified

Published: 2022-09-21T11:15:09.620

Modified: 2025-05-28T16:15:23.157

Link: CVE-2022-2906

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-09-21T00:00:00Z

Links: CVE-2022-2906 - Bugzilla

cve-icon OpenCVE Enrichment

No data.