== CVE-2018-10920/redhat == について、ここに記述してください。 Improper input validation bug in DNS resolver component of knot-resolver before 2.4.1 allows remote attacker to poison cache. To execute this attack the attacker has to have: + access to rogue authoritative server and + ability to trigger query from resolver under attack to authoritative server under attacker's control For successful exploitation the data used to poison cache need to match certain criteria which we decided not to disclose at the moment. 詳細は当面は公表しない。   だがOSSであり、Githubを見れば、分かるひとには分かる。つまり、悪人には公開されている。 -- ToshinoriMaeno <>