By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
{
"versions": [
{
"introduced": "9.8.4"
},
{
"last_affected": "9.16.32"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.3-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.3-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.12-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.5-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.10.7-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.11.3-s1"
},
{
"introduced": "0"
},
{
"last_affected": "9.11.6-s1"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.9.13-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.5-s3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.5-s3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.5-s5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.5-s6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.7-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.8-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.12-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.14-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.19-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.21-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.27-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.29-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.35-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.11.37-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.16.8-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.16.11-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.16.13-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.16.21-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.16.32-s1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "36"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "37"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-38177.json"