MGASA-2022-0388

Source
https://advisories.mageia.org/MGASA-2022-0388.html
Import Source
https://advisories.mageia.org/MGASA-2022-0388.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0388
Related
Published
2022-10-23T22:48:35Z
Modified
2022-10-23T21:54:32Z
Summary
Updated bind packages fix security vulnerability
Details

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. (CVE-2022-2795)

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38177, CVE-2022-38178)

References
Credits

Affected packages

Mageia:8 / bind

Package

Name
bind
Purl
pkg:rpm/mageia/bind?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.11.37-1.1.mga8

Ecosystem specific

{
    "section": "core"
}