Published issues
Permalink
CVE-2026-44608
4.6 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): High (H)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Exploit Maturity (E): Unreported (U)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Use after free and crash under special conditions in RPZ code
NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a locking inconsistency vulnerability that when certain conditions are met (multi-threaded, RPZ XFR reload, RPZ zone with 'rpz-nsip'/'rpz-nsdname' triggers) it could result in heap use-after-free and eventual crash. An adversary can exploit the vulnerability if conditions are first met on a vulnerable Unbound, i.e., multi-threaded, an RPZ zone with 'rpz-nsip'/'rpz-nsdname' triggers and an ongoing XFR for that RPZ zone. Local RPZ files do not trigger the vulnerability. If the timing is right and an XFR happens at the same time another thread needs to read that RPZ zone, the reader may not hold the lock long enough and the thread applying the XFR may free objects that the reader is about to walk causing the use-after-free. Unbound 1.25.1 contains a patch with a fix to the locking code.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-40622
6.6 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): None (N)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Exploit Maturity (E): Unreported (U)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): None (N)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Another 'ghost domain names' attack variant
NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value ('cache-max-ttl'). In configurations where 'harden-referral-path: yes' is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query. Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-41292
6.6 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Exploit Maturity (E): Unreported (U)
-
Provider Urgency (U): Red (Red)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
16 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- unbound-with-systemd
- haskellPackages.unbound-generics
- haskellPackages.unbound-generics-unify
- haskellPackages.unbound-kind-generics
- haskellPackages.unbounded-delays
- python314Packages.pyunbound
2 days, 12 hours ago
-
@LeSuisse
restored
package unbound-with-systemd
2 days, 12 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Long list of incoming EDNS options degrades performance
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Unbound 1.25.1 contains a patch with a fix to limit acceptable incoming EDNS options (100).
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-42923
6.9 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): Low (L)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): Low (L)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 12 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Degradation of service with unbounded NSEC3 hash calculations
NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the DNSSEC validator where the code path to consult the negative cache for DS records does not take into account the limit on NSEC3 hash calculations introduced in 1.19.1. This leads to degradation of service during the attack. An adversary that controls a DNSSEC signed zone can exploit this by signing NSEC3 records with acceptably high iterations for child delegations and querying a vulnerable Unbound. Unbound will keep performing the allowed hash calculations on the NSEC3 records and will not limit the work by the mitigation introduced in 1.19.1. As a side effect, a global lock for the negative cache will be held for the duration of the hashing, blocking other threads that need to consult the negative cache. Coordinated attacks could raise the vulnerability to denial of service. Unbound 1.25.1 contains a patch with a fix to bound the vulnerable code path with the existing limit for NSEC3 hash calculations.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-42534
6.9 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): Low (L)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): Low (L)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
16 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- unbound-with-systemd
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 12 hours ago
-
@LeSuisse
restored
package unbound-with-systemd
2 days, 12 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Jostle logic bypass degrades resolution performance
NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the jostle logic that could defeat its purpose and degrade resolution performance. Retransmits of the same query could renew the age of slow running queries and not allow the jostle logic to see them as aged and potential targets for replacement with new queries. An adversary who can query a vulnerable Unbound and who can control a domain name server that replies slowly and/or maliciously to Unbound's queries can exploit the vulnerability and degrade the resolution performance of Unbound. When Unbound's 'num-queries-per-thread' reaches its limit, the jostle logic kicks in. When a new query comes in, half of the available queries that are also slow to resolve are candidates for replacement. The vulnerability then happens because duplicate queries that need resolution would skew the aging result by using the timestamp of the latest duplicate query instead of the original one that started the resolution effort. Cache and local data response performance remains unaffected. Coordinated attacks could raise this to a denial of resolution service. Unbound 1.25.1 contains a patch with a fix to attach an initial, non-updatable start time for incoming queries that allow the jostle logic to work as intended.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-42960
5.7 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Adjacent (A)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): None (N)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): High (H)
-
Subsequent System Impact Availability (SA): High (H)
-
Exploit Maturity (E): POC (P)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Adjacent (A)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): None (N)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): High (H)
-
Modified Subsequent System Impact Availability (MSA): High (H)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Possible cache poisoning via promiscuous records for the authority section
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such records. If an adversary is able to attach such records in a reply (i.e., spoofed packet, fragmentation attack) he would be able to poison Unbound's cache. A malicious actor can exploit the possible poisonous effect by injecting RRSets other than NS that are also accompanied by address records in a reply, for example MX. This could be achieved by trying to spoof a reply packet or fragmentation attacks. Unbound would then accept the relative address records in the additional section and cache them if the authority RRSet has enough trust at this point, i.e., in-zone data for the delegation point. Unbound 1.25.1 contains a patch with a fix that disregards address records from the additional section if they are not explicitly relevant only to authority NS records, mitigating the possible poison effect. This is a complement fix to CVE-2025-11411.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-42959
8.7 HIGH
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Provider Urgency (U): Red (Red)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Crash during DNSSEC validation of malicious content
NLnet Labs Unbound up to and including version 1.25.0 has a denial of service vulnerability in the DNSSEC validator that can lead to a crash given malicious upstream replies. When Unbound constructs chase-reply messages for validation, the code uses the wrong counter to calculate write offsets for ADDITIONAL section rrsets. DNAME duplication could increase the ANSWER section count and authority filtering could decrease the AUTHORITY section count and create an uninitialized array slot. Combining these two, the validator later dereferences this uninitialized pointer, causing an immediate process crash. An adversary controlling a DNSSEC-signed domain can trigger this bug with a single query by configuring a DNAME chain with unsigned CNAMEs and a response containing unsigned AUTHORITY records alongside signed ADDITIONAL glue records. Unbound 1.25.1 contains a patch with a fix to use the proper counters to calculate the write offsets.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-44390
6.9 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): Low (L)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Provider Urgency (U): Amber (Amber)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): Low (L)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- haskellPackages.unbound-generics-unify
- haskellPackages.unbound-kind-generics
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- lua51Packages.luaunbound
- luaPackages.luaunbound
- haskellPackages.unbounded-delays
- haskellPackages.unbound-generics
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Unbounded name compression in certain cases causes degradation of service
NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability when handling replies with very large RRsets that Unbound needs to perform name compression for. Malicious upstream responses with very large RRsets with records that don't share a suffix above the root can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. An adversary can exploit the vulnerability by querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. A compression limit was introduced in 1.21.1 for this but it didn't account for the case where records would not share any suffix above the root. That causes Unbound to go in a different code path because of the compression tree lookup failure and eventually not increment the compression counter for those operations. Unbound 1.25.1 contains a patch with a fix that increments the compression counter regardless of the compression tree lookup. This is a complement fix to CVE-2024-8508.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-42944
8.7 HIGH
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Provider Urgency (U): Red (Red)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
15 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a vulnerability that results in heap overflow when encoding multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options in the reply packet. The relevant options ('nsid', 'answer-cookie', 'pad-responses' (default)) need to be enabled for the vulnerability to be exploited. An adversary who can query Unbound can exploit the vulnerability by attaching multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options to the query. A flaw in the size calculation of the EDNS field truncates the correct value which allows the encoder to overflow the available space when writing. Those two combined lead to a heap overflow write of Unbound controlled data and eventually a crash. Unbound 1.25.1 contains a patch with a fix to de-duplicate the EDNS options and a fix to prevent truncation of the EDNS field size calculation.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-43619
7.2 HIGH
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Local (L)
-
Attack Complexity (AC): High (H)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): High (H)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): None (N)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Modified Attack Vector (MAV): Local (L)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): High (H)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): None (N)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Provider Urgency (U): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 12 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
19 packages
- grsync
- rrsync
- rsyncy
- btrsync
- parsync
- librsync
- diskrsync
- openrsync
- vdirsyncer
- sqlite-rsync
- yaziPlugins.rsync
- python313Packages.btrsync
- python314Packages.btrsync
- python312Packages.sysrsync
- python313Packages.sysrsync
- python314Packages.sysrsync
- python312Packages.vdirsyncer
- python313Packages.vdirsyncer
- python314Packages.vdirsyncer
2 days, 12 hours ago
-
@LeSuisse
ignored
reference https://w…
2 days, 12 hours ago
-
@LeSuisse
accepted
2 days, 12 hours ago
-
@LeSuisse
ignored
maintainer @ivan
2 days, 12 hours ago
maintainer.ignore
-
@LeSuisse
published on GitHub
2 days, 12 hours ago
Rsync < 3.4.3 Symlink Race Condition via Path-Based Syscalls
Rsync version 3.4.2 and prior contain symlink race condition vulnerabilities in path-based system calls including chmod, lchown, utimes, rename, unlink, mkdir, symlink, mknod, link, rmdir, and lstat that allow local attackers to redirect operations to files outside the exported rsync module. Attackers with local filesystem access can exploit the timing window between path resolution and syscall execution by swapping symlinks to apply sender-supplied permissions, ownership, timestamps, or filenames to arbitrary files outside the intended module boundary on rsync daemons configured with 'use chroot = no'.
Matching in nixpkgs
Fast incremental file transfer utility
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Ignored packages (19)
Synchronize folders, files and make backups
-
-
-
nixos-25.11-small
1.3.1
-
nixpkgs-25.11-darwin
1.3.1
Helper to run rsync-only environments from ssh-logins
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Progress bar wrapper for rsync
-
-
-
nixos-25.11-small
2.2.0
-
nixpkgs-25.11-darwin
2.2.0
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Tool to parallel rsync-like pull sync over SSH
Implementation of the rsync remote-delta algorithm
-
-
-
nixos-25.11-small
2.3.4
-
nixpkgs-25.11-darwin
2.3.4
Rsync for block devices and disk images
-
-
-
nixos-25.11-small
1.3.0
-
nixpkgs-25.11-darwin
1.3.0
BSD-licensed implementation of rsync
Synchronize calendars and contacts
Database remote-copy tool for SQLite
Simple rsync plugin for yazi file manager
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Simple and safe system's rsync wrapper for Python
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
-
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
Synchronize calendars and contacts
Synchronize calendars and contacts
Synchronize calendars and contacts
Package maintainers
Ignored maintainers (1)