CVE-2019-19331
Summary
| CVE | CVE-2019-19331 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-12-16 16:15:00 UTC |
| Updated | 2019-12-17 14:14:00 UTC |
| Description | knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB). |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1779566 – (CVE-2019-19331) CVE-2019-19331 knot-resolver: DNS packets taking few seconds to process with full CPU utilization leads to DoS |
CONFIRM |
bugzilla.redhat.com |
Exploit, Issue Tracking, Patch |
| Knot Resolver 4.3.0 released – Knot Resolver |
MISC |
www.knot-resolver.cz |
Release Notes, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 501028 Alpine Linux Security Update for knot-resolver