bind is vulnerable to denial of service. The vulnerability exists due to a race condition where an attacker can cause the system to remain in CLOSE_WAIT status for an indefinite period of time by injecting a maliciously crafted TCP stream.
cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
kb.isc.org/v1/docs/cve-2022-0396
lists.fedoraproject.org/archives/list/[email protected]/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20220408-0001/