Total vulnerabilities in the database
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Software | From | Fixed in |
---|---|---|
isc / bind | 9.10.7 | 9.10.8.x |
isc / bind | 9.11.7-s1 | 9.11.7-s1.x |
isc / bind | 9.11.3-s1 | 9.11.3-s1.x |
isc / bind | 9.11.6-s1 | 9.11.6-s1.x |
isc / bind | 9.11.5-s5 | 9.11.5-s5.x |
isc / bind | 9.11.5-s3 | 9.11.5-s3.x |
isc / bind | 9.11.5-s6 | 9.11.5-s6.x |
isc / bind | 9.11.12-s1 | 9.11.12-s1.x |
isc / bind | 9.11.8-s1 | 9.11.8-s1.x |
isc / bind | 9.9.12 | 9.9.13.x |
isc / bind | 9.11.21-s1 | 9.11.21-s1.x |
isc / bind | 9.16.8-s1 | 9.16.8-s1.x |
isc / bind | 9.16.11-s1 | 9.16.11-s1.x |
isc / bind | 9.11.27-s1 | 9.11.27-s1.x |
isc / bind | 9.16.13-s1 | 9.16.13-s1.x |
isc / bind | 9.11.29-s1 | 9.11.29-s1.x |
isc / bind | 9.16.21-s1 | 9.16.21-s1.x |
isc / bind | 9.11.35-s1 | 9.11.35-s1.x |
isc / bind | 9.11.14-s1 | 9.11.14-s1.x |
isc / bind | 9.11.19-s1 | 9.11.19-s1.x |
isc / bind | 9.11.37-s1 | 9.11.37-s1.x |
isc / bind | 9.16.32-s1 | 9.16.32-s1.x |
isc / bind | 9.11.3-s4 | 9.11.3-s4.x |
isc / bind | 9.11.3 | 9.16.32.x |
debian / debian_linux | 11.0 | 11.0.x |
fedoraproject / fedora | 35 | 35.x |
fedoraproject / fedora | 36 | 36.x |
fedoraproject / fedora | 37 | 37.x |