9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.2%
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
unbound: integer overflow in the regional allocator via regional_alloc (CVE-2019-25032)
unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write (CVE-2019-25034)
unbound: out-of-bounds write in sldns_bget_token_par (CVE-2019-25035)
unbound: assertion failure and denial of service in synth_cname (CVE-2019-25036)
unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet (CVE-2019-25037)
unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c (CVE-2019-25038)
unbound: integer overflow in a size calculation in respip/respip.c (CVE-2019-25039)
unbound: infinite loop via a compressed name in dname_pkt_copy (CVE-2019-25040)
unbound: assertion failure via a compressed name in dname_pkt_copy (CVE-2019-25041)
unbound: out-of-bounds write via a compressed name in rdata_copy (CVE-2019-25042)
unbound: symbolic link traversal when writing PID file (CVE-2020-28935)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1714175
bugzilla.redhat.com/show_bug.cgi?id=1842837
bugzilla.redhat.com/show_bug.cgi?id=1850460
bugzilla.redhat.com/show_bug.cgi?id=1878761
bugzilla.redhat.com/show_bug.cgi?id=1954772
bugzilla.redhat.com/show_bug.cgi?id=1954778
bugzilla.redhat.com/show_bug.cgi?id=1954780
bugzilla.redhat.com/show_bug.cgi?id=1954782
bugzilla.redhat.com/show_bug.cgi?id=1954794
bugzilla.redhat.com/show_bug.cgi?id=1954796
bugzilla.redhat.com/show_bug.cgi?id=1954797
bugzilla.redhat.com/show_bug.cgi?id=1954799
bugzilla.redhat.com/show_bug.cgi?id=1954801
bugzilla.redhat.com/show_bug.cgi?id=1954804
errata.rockylinux.org/RLSA-2021:1853
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.2%