Bind9 is vulnerable to denial of service. The vulnerability is due to malformed EdDSA signatures, which result in memory leaks. An attacker can continuously spoof the target resolver, leading to denial of service.
www.openwall.com/lists/oss-security/2022/09/21/3
github.com/isc-projects/bind9/commit/dd91276106d99407b8b630aa9e32c421550a8de2
kb.isc.org/docs/cve-2022-38178
lists.debian.org/debian-lts-announce/2022/10/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
lists.fedoraproject.org/archives/list/[email protected]/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
lists.fedoraproject.org/archives/list/[email protected]/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
security-tracker.debian.org/tracker/CVE-2022-38178
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20221228-0009/
www.debian.org/security/2022/dsa-5235