Debian 10264 Published by

A bind9 security update has been released for Debian GNU/Linux 8 and 9 Extended LTS to address several vulnerabilities.



ELA-698-1 bind9 security update

Package bind9
Version 1:9.9.5.dfsg-9+deb8u28 (jessie), 1:9.10.3.dfsg.P4-12.3+deb9u13 (stretch)
Related CVEs CVE-2022-2795 CVE-2022-38177


Several vulnerabilities were discovered in BIND, a DNS server implementation.

CVE-2022-2795

Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a
flaw in the resolver code can cause named to spend excessive amounts
of time on processing large delegations, significantly degrade
resolver performance and result in denial of service.
CVE-2022-38177

It was discovered that the DNSSEC verification code for the ECDSA
algorithm is susceptible to a memory leak flaw. A remote attacker
can take advantage of this flaw to cause BIND to consume resources,
resulting in a denial of service.


For Debian 8 jessie, these problems have been fixed in version 1:9.9.5.dfsg-9+deb8u28.

For Debian 9 stretch, these problems have been fixed in version 1:9.10.3.dfsg.P4-12.3+deb9u13.

We recommend that you upgrade your bind9 packages.

Further information about Extended LTS security advisories can be found at: debian Extended Long term support

  ELA-698-1 bind9 security update