Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
27 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1343#note_262558 - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/10/msg00008.html - Mailing List, Third Party Advisory |
07 Nov 2023, 03:52
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-407 |
Information
Published : 2022-09-23 16:15
Updated : 2025-05-27 15:15
NVD link : CVE-2022-40188
Mitre link : CVE-2022-40188
JSON object : View
Products Affected
debian
- debian_linux
nic
- knot_resolver
fedoraproject
- fedora
CWE
CWE-407
Inefficient Algorithmic Complexity