libbind9.so is vulnerable to denial of service. The vulnerability exists because the DNSSEC verification code used in the library for the ECDSA algorithm leaks memory when the signature length is mismatched, allowing an attacker to cause an application crash.
www.openwall.com/lists/oss-security/2022/09/21/3
github.com/isc-projects/bind9/commit/cacca9bdf956231f44c1d01eef7b1390928a4ef7
kb.isc.org/docs/cve-2022-38177
lists.debian.org/debian-lts-announce/2022/10/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
lists.fedoraproject.org/archives/list/[email protected]/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
lists.fedoraproject.org/archives/list/[email protected]/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20221228-0010/
www.debian.org/security/2022/dsa-5235
www.openwall.com/lists/oss-security/2022/09/21/3