Improper Resource Shutdown or Release Affecting knot-resolver package, versions <3.2.1-3ubuntu2.2


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.33% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-KNOTRESOLVER-1166283
  • published7 Mar 2023
  • disclosed16 Dec 2019

Introduced: 16 Dec 2019

CVE-2019-19331  (opens in a new tab)
CWE-404  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 knot-resolver to version 3.2.1-3ubuntu2.2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream knot-resolver package and not the knot-resolver package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

CVSS Base Scores

version 3.1