Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
{ "binaries": [ { "binary_name": "knot-resolver", "binary_version": "1.0.0~beta3-1ubuntu0.1~esm1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-12667.json"
{ "binaries": [ { "binary_name": "knot-resolver", "binary_version": "2.1.1-1ubuntu0.1~esm2" }, { "binary_name": "knot-resolver-module-http", "binary_version": "2.1.1-1ubuntu0.1~esm2" }, { "binary_name": "libkres6", "binary_version": "2.1.1-1ubuntu0.1~esm2" } ] }
{ "binaries": [ { "binary_name": "knot-resolver", "binary_version": "3.2.1-3ubuntu2.2" }, { "binary_name": "knot-resolver-module-http", "binary_version": "3.2.1-3ubuntu2.2" } ], "availability": "No subscription required" }