Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3138-1 | bind9 security update |
Debian DSA |
DSA-5235-1 | bind9 security update |
EUVD |
EUVD-2022-40774 | By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. |
Ubuntu USN |
USN-5626-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.
Workaround
Disable the following algorithms in your configuration using the disable-algorithms option: ED25519, ED448. Note that this causes zones signed with these algorithms to be treated as insecure.
Wed, 28 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T15:23:06.572Z
Reserved: 2022-08-12T00:00:00.000Z
Link: CVE-2022-38178
Updated: 2024-08-03T10:45:52.980Z
Status : Modified
Published: 2022-09-21T11:15:09.733
Modified: 2025-05-28T16:15:26.723
Link: CVE-2022-38178
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN