By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bind | Isc | 9.9.12 (including) | 9.9.13 (including) |
Bind | Isc | 9.10.7 (including) | 9.10.8 (including) |
Bind | Isc | 9.11.3 (including) | 9.16.32 (including) |
Bind | Isc | 9.11.3-s1 (including) | 9.11.3-s1 (including) |
Bind | Isc | 9.11.3-s4 (including) | 9.11.3-s4 (including) |
Bind | Isc | 9.11.5-s3 (including) | 9.11.5-s3 (including) |
Bind | Isc | 9.11.5-s5 (including) | 9.11.5-s5 (including) |
Bind | Isc | 9.11.5-s6 (including) | 9.11.5-s6 (including) |
Bind | Isc | 9.11.6-s1 (including) | 9.11.6-s1 (including) |
Bind | Isc | 9.11.7-s1 (including) | 9.11.7-s1 (including) |
Bind | Isc | 9.11.8-s1 (including) | 9.11.8-s1 (including) |
Bind | Isc | 9.11.12-s1 (including) | 9.11.12-s1 (including) |
Bind | Isc | 9.11.14-s1 (including) | 9.11.14-s1 (including) |
Bind | Isc | 9.11.19-s1 (including) | 9.11.19-s1 (including) |
Bind | Isc | 9.11.21-s1 (including) | 9.11.21-s1 (including) |
Bind | Isc | 9.11.27-s1 (including) | 9.11.27-s1 (including) |
Bind | Isc | 9.11.29-s1 (including) | 9.11.29-s1 (including) |
Bind | Isc | 9.11.35-s1 (including) | 9.11.35-s1 (including) |
Bind | Isc | 9.11.37-s1 (including) | 9.11.37-s1 (including) |
Bind | Isc | 9.16.8-s1 (including) | 9.16.8-s1 (including) |
Bind | Isc | 9.16.11-s1 (including) | 9.16.11-s1 (including) |
Bind | Isc | 9.16.13-s1 (including) | 9.16.13-s1 (including) |
Bind | Isc | 9.16.21-s1 (including) | 9.16.21-s1 (including) |
Bind | Isc | 9.16.32-s1 (including) | 9.16.32-s1 (including) |
Bind9 | Ubuntu | bionic | * |
Bind9 | Ubuntu | devel | * |
Bind9 | Ubuntu | focal | * |
Bind9 | Ubuntu | jammy | * |
Bind9 | Ubuntu | kinetic | * |
Bind9 | Ubuntu | trusty | * |
Bind9 | Ubuntu | xenial | * |
Red Hat Enterprise Linux 7 | RedHat | bind-32:9.11.4-26.P2.el7_9.10 | * |
Red Hat Enterprise Linux 8 | RedHat | bind-32:9.11.36-3.el8_6.1 | * |
Red Hat Enterprise Linux 8 | RedHat | bind9.16-32:9.16.23-0.7.el8_6.1 | * |
Red Hat Enterprise Linux 8 | RedHat | bind-32:9.11.36-3.el8_6.1 | * |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | RedHat | bind-32:9.11.4-26.P2.el8_1.6 | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | bind-32:9.11.13-6.el8_2.4 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | bind-32:9.11.26-4.el8_4.1 | * |
Red Hat Enterprise Linux 9 | RedHat | bind-32:9.16.23-1.el9_0.1 | * |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | RedHat | redhat-virtualization-host-0:4.5.3-202211170828_8.6 | * |