It was discovered that Bind incorrectly handled certain TCP-pipelined
queries. A remote attacker could possibly use this issue to cause Bind to
consume resources, resulting in a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 19.10 | noarch | bind9 | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9-dbgsym | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9-doc | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9-host | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9-host-dbgsym | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9utils | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | bind9utils-dbgsym | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | dnsutils | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | dnsutils-dbgsym | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |
Ubuntu | 19.10 | noarch | libbind-dev | <Â 1:9.11.5.P4+dfsg-5.1ubuntu2.1 | UNKNOWN |