By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
www.openwall.com/lists/oss-security/2022/09/21/3
kb.isc.org/docs/cve-2022-38178
lists.debian.org/debian-lts-announce/2022/10/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
lists.fedoraproject.org/archives/list/[email protected]/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
lists.fedoraproject.org/archives/list/[email protected]/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20221228-0009/
www.debian.org/security/2022/dsa-5235