CVE Vulnerabilities

CVE-2019-19331

Improper Resource Shutdown or Release

Published: Dec 16, 2019 | Modified: Apr 26, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Knot_resolver Nic * 4.3.0 (excluding)
Knot-resolver Ubuntu bionic *
Knot-resolver Ubuntu disco *
Knot-resolver Ubuntu eoan *
Knot-resolver Ubuntu esm-apps/bionic *
Knot-resolver Ubuntu esm-apps/xenial *
Knot-resolver Ubuntu focal *
Knot-resolver Ubuntu groovy *
Knot-resolver Ubuntu hirsute *
Knot-resolver Ubuntu impish *
Knot-resolver Ubuntu trusty *
Knot-resolver Ubuntu upstream *
Knot-resolver Ubuntu xenial *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References