An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
Solution:
Workaround:
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://kb.isc.org/docs/cve-2022-2906 | vendor advisory patch |
http://www.openwall.com/lists/oss-security/2022/09/21/3 | third party advisory mailing list patch |
https://security.gentoo.org/glsa/202210-25 | vendor advisory third party advisory |