In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Ubuntu:20.04
bind9
to version 1:9.18.30-0ubuntu0.20.04.2 or higher.
Note: Versions mentioned in the description apply only to the upstream bind9
package and not the bind9
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:20.04
relevant fixed versions and status.
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.