Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. hickory-proto
  4. ›
  5. GHSA-q2qq-hmj6-3wpp

GHSA-q2qq-hmj6-3wpp: hickory-proto vulnerable to CPU exhaustion during message encoding due to O(n²) name compression

May 7, 2026

During message encoding, hickory-proto’s BinEncoder stores pointers to labels that are candidates for name compression in a Vec<(usize, Vec<u8>)>. The name compression logic then searches for matches with a linear scan.

A malicious message with many records can both introduce many candidate labels, and invoke this linear scan many times. This can amplify CPU exhaustion in DoS attacks.

This is similar to CVE-2024-8508.

References

  • github.com/advisories/GHSA-q2qq-hmj6-3wpp
  • github.com/hickory-dns/hickory-dns
  • github.com/hickory-dns/hickory-dns/security/advisories/GHSA-q2qq-hmj6-3wpp
  • rustsec.org/advisories/RUSTSEC-2026-0119.html

Code Behaviors & Features

Detect and mitigate GHSA-q2qq-hmj6-3wpp with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.3.1 before 0.26.1

Fixed versions

  • 0.26.1

Solution

Upgrade to version 0.26.1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-407: Inefficient Algorithmic Complexity
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

cargo/hickory-proto/GHSA-q2qq-hmj6-3wpp.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:52 +0000.