Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/knot-resolver@6.2.0-2?distro=trixie
purl pkg:deb/debian/knot-resolver@6.2.0-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-2wu3-v2hz-q3bv Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records. CVE-2020-12667
VCID-66sa-bc5p-jqde Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50387
VCID-6v2g-xt54-7fgs A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service. CVE-2018-1110
VCID-8ks2-kv5d-gkdc knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB). CVE-2019-19331
VCID-c7c5-awxv-j3de Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets. CVE-2022-40188
VCID-efrw-bm7j-6qgz Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers. CVE-2023-46317
VCID-fptj-ztkq-7uag A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol. CVE-2019-10191
VCID-g2wb-bccm-ufhn A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191. CVE-2019-10190
VCID-gg4r-446v-kybs Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache. CVE-2018-10920
VCID-ne61-utfg-8bgx Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof). CVE-2021-40083
VCID-p1yj-k985-kkbv Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. CVE-2018-1000002
VCID-ps4g-f1q9-wqhm Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response. CVE-2023-26249
VCID-vprj-j7u6-zbe7 Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. CVE-2023-50868

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:11:00.150348+00:00 Debian Importer Fixing VCID-8ks2-kv5d-gkdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:21:01.619587+00:00 Debian Importer Fixing VCID-p1yj-k985-kkbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:25:34.961691+00:00 Debian Importer Fixing VCID-2wu3-v2hz-q3bv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:54.847116+00:00 Debian Importer Fixing VCID-gg4r-446v-kybs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:10.491081+00:00 Debian Importer Fixing VCID-fptj-ztkq-7uag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:31.592232+00:00 Debian Importer Fixing VCID-6v2g-xt54-7fgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:17:22.458287+00:00 Debian Importer Fixing VCID-ne61-utfg-8bgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:22.609833+00:00 Debian Importer Fixing VCID-g2wb-bccm-ufhn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:04:16.375074+00:00 Debian Importer Fixing VCID-8ks2-kv5d-gkdc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:59.407619+00:00 Debian Importer Fixing VCID-p1yj-k985-kkbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:47:02.270862+00:00 Debian Importer Fixing VCID-2wu3-v2hz-q3bv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:36:04.222115+00:00 Debian Importer Fixing VCID-gg4r-446v-kybs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:48.156578+00:00 Debian Importer Fixing VCID-fptj-ztkq-7uag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:38.537506+00:00 Debian Importer Fixing VCID-6v2g-xt54-7fgs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:12:27.046024+00:00 Debian Importer Fixing VCID-ne61-utfg-8bgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:16.171898+00:00 Debian Importer Fixing VCID-g2wb-bccm-ufhn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:28:06.251006+00:00 Debian Importer Fixing VCID-vprj-j7u6-zbe7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:06.203875+00:00 Debian Importer Fixing VCID-66sa-bc5p-jqde https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:06.156672+00:00 Debian Importer Fixing VCID-efrw-bm7j-6qgz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:06.120001+00:00 Debian Importer Fixing VCID-ps4g-f1q9-wqhm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:06.072615+00:00 Debian Importer Fixing VCID-c7c5-awxv-j3de https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:06.017863+00:00 Debian Importer Fixing VCID-ne61-utfg-8bgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.968533+00:00 Debian Importer Fixing VCID-2wu3-v2hz-q3bv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.918323+00:00 Debian Importer Fixing VCID-8ks2-kv5d-gkdc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.868989+00:00 Debian Importer Fixing VCID-fptj-ztkq-7uag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.820244+00:00 Debian Importer Fixing VCID-g2wb-bccm-ufhn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.769496+00:00 Debian Importer Fixing VCID-6v2g-xt54-7fgs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.718429+00:00 Debian Importer Fixing VCID-gg4r-446v-kybs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:05.668529+00:00 Debian Importer Fixing VCID-p1yj-k985-kkbv https://security-tracker.debian.org/tracker/data/json 38.1.0