By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Created bind tracking bugs for this issue: Affects: fedora-all [bug 2128705] Created dhcp tracking bugs for this issue: Affects: fedora-all [bug 2128707]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:0402 https://access.redhat.com/errata/RHSA-2023:0402
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-2795
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2261 https://access.redhat.com/errata/RHSA-2023:2261
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2792 https://access.redhat.com/errata/RHSA-2023:2792
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3002 https://access.redhat.com/errata/RHSA-2023:3002
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:2720 https://access.redhat.com/errata/RHSA-2024:2720