ELA-698-1 bind9 security update
Package bind9
ELA-698-1 bind9 security update
Version 1:9.9.5.dfsg-9+deb8u28 (jessie), 1:9.10.3.dfsg.P4-12.3+deb9u13 (stretch)
Related CVEs CVE-2022-2795 CVE-2022-38177
Several vulnerabilities were discovered in BIND, a DNS server implementation.
CVE-2022-2795
Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a
flaw in the resolver code can cause named to spend excessive amounts
of time on processing large delegations, significantly degrade
resolver performance and result in denial of service.
CVE-2022-38177
It was discovered that the DNSSEC verification code for the ECDSA
algorithm is susceptible to a memory leak flaw. A remote attacker
can take advantage of this flaw to cause BIND to consume resources,
resulting in a denial of service.
For Debian 8 jessie, these problems have been fixed in version 1:9.9.5.dfsg-9+deb8u28.
For Debian 9 stretch, these problems have been fixed in version 1:9.10.3.dfsg.P4-12.3+deb9u13.
We recommend that you upgrade your bind9 packages.
Further information about Extended LTS security advisories can be found at: debian Extended Long term support
A bind9 security update has been released for Debian GNU/Linux 8 and 9 Extended LTS to address several vulnerabilities.