Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-35134 | An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service. |
Ubuntu USN |
USN-5626-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.7 or BIND 9.19.5.
Workaround
There are no known workarounds. TKEY record processing in GSS-TSIG mode is not affected by this defect. The memory leak impacts authoritative DNS server TKEY record processing only. Client processing (resolver functions) do not trigger this defect.
Wed, 28 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T15:25:56.879Z
Reserved: 2022-08-19T00:00:00.000Z
Link: CVE-2022-2906
Updated: 2024-08-03T00:52:59.888Z
Status : Modified
Published: 2022-09-21T11:15:09.620
Modified: 2025-05-28T16:15:23.157
Link: CVE-2022-2906
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN