Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.4.4-1", "binary_name": "knot-resolver" }, { "binary_version": "5.4.4-1", "binary_name": "knot-resolver-dbgsym" }, { "binary_version": "5.4.4-1", "binary_name": "knot-resolver-doc" }, { "binary_version": "5.4.4-1", "binary_name": "knot-resolver-module-http" } ] }