vulnerability

Amazon Linux 2023: CVE-2022-2795: Important priority package update for bind

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Sep 21, 2022
Added
Feb 17, 2025
Modified
Jul 4, 2025

Description

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
A flaw was found in bind. When flooding the target resolver with special queries, an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.

Solutions

amazon-linux-2023-upgrade-bindamazon-linux-2023-upgrade-bind-chrootamazon-linux-2023-upgrade-bind-debuginfoamazon-linux-2023-upgrade-bind-debugsourceamazon-linux-2023-upgrade-bind-develamazon-linux-2023-upgrade-bind-dlz-filesystemamazon-linux-2023-upgrade-bind-dlz-filesystem-debuginfoamazon-linux-2023-upgrade-bind-dlz-ldapamazon-linux-2023-upgrade-bind-dlz-ldap-debuginfoamazon-linux-2023-upgrade-bind-dlz-mysqlamazon-linux-2023-upgrade-bind-dlz-mysql-debuginfoamazon-linux-2023-upgrade-bind-dlz-sqlite3amazon-linux-2023-upgrade-bind-dlz-sqlite3-debuginfoamazon-linux-2023-upgrade-bind-dnssec-docamazon-linux-2023-upgrade-bind-dnssec-utilsamazon-linux-2023-upgrade-bind-dnssec-utils-debuginfoamazon-linux-2023-upgrade-bind-libsamazon-linux-2023-upgrade-bind-libs-debuginfoamazon-linux-2023-upgrade-bind-licenseamazon-linux-2023-upgrade-bind-pkcs11amazon-linux-2023-upgrade-bind-pkcs11-debuginfoamazon-linux-2023-upgrade-bind-pkcs11-develamazon-linux-2023-upgrade-bind-pkcs11-libsamazon-linux-2023-upgrade-bind-pkcs11-libs-debuginfoamazon-linux-2023-upgrade-bind-pkcs11-utilsamazon-linux-2023-upgrade-bind-pkcs11-utils-debuginfoamazon-linux-2023-upgrade-bind-utilsamazon-linux-2023-upgrade-bind-utils-debuginfoamazon-linux-2023-upgrade-python3-bind
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.