Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.
{ "binaries": [ { "binary_name": "knot-resolver", "binary_version": "2.1.1-1ubuntu0.1~esm2" }, { "binary_name": "knot-resolver-module-http", "binary_version": "2.1.1-1ubuntu0.1~esm2" }, { "binary_name": "libkres-dev", "binary_version": "2.1.1-1ubuntu0.1~esm2" }, { "binary_name": "libkres6", "binary_version": "2.1.1-1ubuntu0.1~esm2" } ] }