CVE-2023-26249: Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response. Please stabilize 5.6.0.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1175a164201bad5751040ae5d4a008a31a783332 commit 1175a164201bad5751040ae5d4a008a31a783332 Author: Matthew Smith <matthew@gentoo.org> AuthorDate: 2023-02-27 18:22:19 +0000 Commit: Matthew Smith <matthew@gentoo.org> CommitDate: 2023-02-27 18:22:19 +0000 net-dns/knot-resolver: drop 5.5.3 Bug: https://bugs.gentoo.org/897928 Signed-off-by: Matthew Smith <matthew@gentoo.org> net-dns/knot-resolver/Manifest | 2 - net-dns/knot-resolver/knot-resolver-5.5.3.ebuild | 93 ------------------------ 2 files changed, 95 deletions(-)