knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3795-1 knot-resolver security update
EUVD EUVD EUVD-2019-8952 knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).
Ubuntu USN Ubuntu USN USN-7047-1 Knot Resolver vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T02:16:46.880Z

Reserved: 2019-11-27T00:00:00

Link: CVE-2019-19331

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-12-16T16:15:11.660

Modified: 2024-11-21T04:34:35.420

Link: CVE-2019-19331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.