Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets. https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1343#note_262558 https://www.knot-resolver.cz/2022-09-21-knot-resolver-5.5.3.html
Created knot-resolver tracking bugs for this issue: Affects: epel-all [bug 2129737] Affects: fedora-all [bug 2129736]
5.5.3 packages with fix for this issue already hit stable f35, f36, f37, el7, el8, el9, and rawhide: https://bodhi.fedoraproject.org/updates/?search=knot-resolver-5.5.3
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.