Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.
{ "binaries": [ { "binary_version": "2.1.1-1ubuntu0.1~esm2", "binary_name": "knot-resolver" }, { "binary_version": "2.1.1-1ubuntu0.1~esm2", "binary_name": "knot-resolver-module-http" }, { "binary_version": "2.1.1-1ubuntu0.1~esm2", "binary_name": "libkres-dev" }, { "binary_version": "2.1.1-1ubuntu0.1~esm2", "binary_name": "libkres6" } ] }