Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.2.1-3ubuntu2.2", "binary_name": "knot-resolver" }, { "binary_version": "3.2.1-3ubuntu2.2", "binary_name": "knot-resolver-dbgsym" }, { "binary_version": "3.2.1-3ubuntu2.2", "binary_name": "knot-resolver-doc" }, { "binary_version": "3.2.1-3ubuntu2.2", "binary_name": "knot-resolver-module-http" } ] }