{"id":"AZL-56105","summary":"CVE-2024-12705 affecting package bind for versions less than 9.20.5-1","details":"Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.","modified":"2026-04-01T05:18:48.191562Z","published":"2025-01-29T22:15:28Z","upstream":["CVE-2024-12705"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12705"}],"affected":[{"package":{"name":"bind","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/bind"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.20.5-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-56105.json"}}],"schema_version":"1.7.5"}