unbound is vulnerable to arbitrary code execution. The vulnerability exists through an integer overflow in a size calculation in respip/respip.c
. A flaw was found in unbound. An integer overflow in ub_packed_rrset_key
function may lead to a buffer overflow of the allocated buffer if the size can be controlled by an attacker.
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
access.redhat.com/errata/RHSA-2021:1853
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1954797
lists.debian.org/debian-lts-announce/2021/05/msg00007.html
ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
security.netapp.com/advisory/ntap-20210507-0007/