Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.
{
"binaries": [
{
"binary_name": "knot-resolver",
"binary_version": "2.1.1-1ubuntu0.1~esm2"
},
{
"binary_name": "knot-resolver-module-http",
"binary_version": "2.1.1-1ubuntu0.1~esm2"
},
{
"binary_name": "libkres-dev",
"binary_version": "2.1.1-1ubuntu0.1~esm2"
},
{
"binary_name": "libkres6",
"binary_version": "2.1.1-1ubuntu0.1~esm2"
}
]
}