Mageia 2022-0388: bind security update
Summary
By flooding the target resolver with queries exploiting this flaw an
attacker can significantly impair the resolver's performance,
effectively denying legitimate clients access to the DNS resolution
service. (CVE-2022-2795)
By spoofing the target resolver with responses that have a malformed ECDSA
signature, an attacker can trigger a small memory leak. It is possible to
gradually erode available memory to the point where named crashes for lack
of resources. (CVE-2022-38177, CVE-2022-38178)
References
- https://bugs.mageia.org/show_bug.cgi?id=30877
- https://kb.isc.org/docs/cve-2022-2795
- https://kb.isc.org/docs/cve-2022-38177
- https://kb.isc.org/docs/cve-2022-38178
- https://ubuntu.com/security/notices/USN-5626-1
- https://www.debian.org/lts/security/2022/dla-3138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178
Resolution
MGASA-2022-0388 - Updated bind packages fix security vulnerability
SRPMS
- 8/core/bind-9.11.37-1.1.mga8