Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
References
| Link | Resource |
|---|---|
| https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1343#note_262558 | Release Notes Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2VE5K3VDUHJOIA2IGT3G5R76IBADMNE/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIMDNIUI7GTUEKIBBYYW7OCTJQFPDNXL/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO6LIVQS62MI5GG4OVYB5RHVZMYNHAHG/ | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/10/msg00008.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2022-09-23 16:15
Updated : 2023-08-08 14:22
NVD link : CVE-2022-40188
Mitre link : CVE-2022-40188
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
nic
- knot_resolver
CWE
CWE-407
Inefficient Algorithmic Complexity
