It was discovered that Bind incorrectly handled certain DNS messages with invalid TSIG. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "bind9",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9-dev",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9-dnsutils",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9-host",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9-libs",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9-utils",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "bind9utils",
"binary_version": "1:9.20.4-3ubuntu1.1"
},
{
"binary_name": "dnsutils",
"binary_version": "1:9.20.4-3ubuntu1.1"
}
]
}