[Bug 281894] dns/unbound: Security upgrade to 1.21.1

From: <bugzilla-noreply_at_freebsd.org>
Date: Sun, 06 Oct 2024 12:23:27 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281894

            Bug ID: 281894
           Summary: dns/unbound: Security upgrade to 1.21.1
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://nlnetlabs.nl/news/2024/Oct/03/unbound-1.21.1-r
                    eleased/
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: jaap@NLnetLabs.nl
                CC: security-officer@FreeBSD.org
 Attachment #254050 maintainer-approval+
             Flags:

Created attachment 254050
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=254050&action=edit
patch to upgrade

A vulnerability has been discovered in Unbound when handling replies with very
large RRsets that Unbound needs to perform name compression for.

Malicious upstreams responses with very large RRsets can cause Unbound to spend
a considerable time applying name compression to downstream replies. This can
lead to degraded performance and eventually denial of service in well
orchestrated attacks.

Unbound version 1.21.1 introduces a hard limit on the number of name
compression calculations it is willing to do per packet. Packets that need more
compression will result in semi-compressed packets or truncated packets, even
on TCP for huge messages, to avoid locking the CPU for long.

This change should not affect normal DNS traffic.

We would like to thank Toshifumi Sakaguchi for discovering and responsibly
disclosing the vulnerability.


Apart from this, This pot also includes a patch to bug fix for people using the
base openSSL (See also bug #281804).

-- 
You are receiving this mail because:
You are the assignee for the bug.