Описание
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | needs-triage | |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | needs-triage | |
| esm-apps/noble | needs-triage | |
| esm-apps/xenial | needs-triage | |
| esm-infra-legacy/trusty | needs-triage | |
| jammy | DNE | |
| noble | needs-triage | |
| plucky | needs-triage | |
| questing | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/xenial | needs-triage | |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/bionic | released | 2.5.1-1ubuntu1.16+esm5 |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra/focal | released | 2.7.0-5ubuntu1.18+esm1 |
| jammy | DNE | |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| jammy | released | 3.0.2-7ubuntu2.11 |
| noble | DNE | |
| plucky | DNE | |
| questing | DNE | |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| jammy | DNE | |
| noble | released | 3.2.3-1ubuntu0.24.04.6 |
| plucky | DNE | |
| questing | DNE | |
| upstream | released | 3.2.9 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.3.8-2ubuntu2 |
| jammy | DNE | |
| noble | DNE | |
| plucky | released | 3.3.7-1ubuntu2.1 |
| questing | released | 3.3.8-2ubuntu2 |
| upstream | released | 3.3.9 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 3.6.7-2ubuntu1 |
| jammy | not-affected | code not present |
| noble | not-affected | code not present |
| plucky | released | 3.6.3-1ubuntu0.1 |
| questing | released | 3.6.7-2ubuntu1 |
| upstream | needs-triage |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
The attack vector is a potential Denial of Service (DoS). The vulnerab ...
resolv vulnerable to DoS via insufficient DNS domain name length validation
7.5 High
CVSS3