Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Knot_resolver | Nic | * | 5.5.3 (excluding) |
| Knot-resolver | Ubuntu | bionic | * |
| Knot-resolver | Ubuntu | esm-apps/bionic | * |
| Knot-resolver | Ubuntu | esm-apps/focal | * |
| Knot-resolver | Ubuntu | esm-apps/jammy | * |
| Knot-resolver | Ubuntu | esm-apps/xenial | * |
| Knot-resolver | Ubuntu | focal | * |
| Knot-resolver | Ubuntu | jammy | * |
| Knot-resolver | Ubuntu | kinetic | * |
| Knot-resolver | Ubuntu | trusty | * |
| Knot-resolver | Ubuntu | upstream | * |
| Knot-resolver | Ubuntu | xenial | * |