Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3138-1 | bind9 security update |
![]() |
DSA-5235-1 | bind9 security update |
![]() |
EUVD-2022-40774 | By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. |
![]() |
USN-5626-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.
Workaround
Disable the following algorithms in your configuration using the disable-algorithms option: ED25519, ED448. Note that this causes zones signed with these algorithms to be treated as insecure.
Wed, 28 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-05-28T15:23:06.572Z
Reserved: 2022-08-12T00:00:00.000Z
Link: CVE-2022-38178

Updated: 2024-08-03T10:45:52.980Z

Status : Modified
Published: 2022-09-21T11:15:09.733
Modified: 2025-05-28T16:15:26.723
Link: CVE-2022-38178


No data.