Unbound 1.21.1 released

Yorgos Thessalonikefs yorgos at nlnetlabs.nl
Fri Oct 4 11:21:15 UTC 2024


Hi all,

There was a mishap when tagging the release on git.
It was automatically created (and not signed) by GitHub when doing the 
release there.

I have since corrected the issue and *replaced* the old tag with the 
correct new one.

If you are relying on git and git tags you can remove the local one with:

	git tag -d release-1.21.1

and fetch the new one with:

	git fetch -u origin tag release-1.21.1

(replace "origin" in case you are using a different remote name for the 
NLnetLabs repository)

Both the old and the updated tag should be pointing to the same commit:
b7c61d7cc256d6a174e6179622c7fa968272c259

You can test which tag you have by doing

	git rev-parse refs/tags/release-1.21.1

which should return 2428fe1e4ca6abebfd9ab5f25c7ddcf3f919a257 if you have 
the updated one.

Sorry for any inconvenience.

Best regards,
-- Yorgos

On 03/10/2024 18:00, Yorgos Thessalonikefs via Unbound-users wrote:
> Hi,
> 
> Unbound 1.21.1 is available:
> https://nlnetlabs.nl/downloads/unbound/unbound-1.21.1.tar.gz
> sha256 3036d23c23622b36d3c87e943117bdec1ac8f819636eb978d806416b0fa9ea46
> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.21.1.tar.gz.asc
> 
> ** This release is signed by yorgos at nlnetlabs.nl. Please find the 
> relevant key at https://nlnetlabs.nl/people/ **
> 
> This security release fixes CVE-2024-8508.
> 
> A vulnerability has been discovered in Unbound when handling replies
> with very large RRsets that Unbound needs to perform name compression
> for.
> 
> Malicious upstreams responses with very large RRsets can cause Unbound
> to spend a considerable time applying name compression to downstream
> replies. This can lead to degraded performance and eventually denial of
> service in well orchestrated attacks.
> 
> The vulnerability can be exploited by a malicious actor querying Unbound
> for the specially crafted contents of a malicious zone with very large
> RRsets.
> Before Unbound replies to the query it will try to apply name
> compression which was an unbounded operation that could lock the CPU
> until the whole packet was complete.
> 
> Unbound version 1.21.1 introduces a hard limit on the number of name
> compression calculations it is willing to do per packet.
> Packets that need more compression will result in semi-compressed
> packets or truncated packets, even on TCP for huge messages, to avoid
> locking the CPU for long.
> 
> This change should not affect normal DNS traffic.
> 
> We would like to thank Toshifumi Sakaguchi for discovering and
> responsibly disclosing the vulnerability.
> 
> 
> Bug Fixes:
> - Fix CVE-2024-8508, unbounded name compression could lead to denial of
>    service.
> 
> Best regards,
> -- Yorgos

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.nlnetlabs.nl/pipermail/unbound-users/attachments/20241004/333930b2/attachment-0001.bin>


More information about the Unbound-users mailing list