RHSA-2026:19752
Vulnerability from csaf_redhat - Published: 2026-05-20 17:20 - Updated: 2026-05-21 02:25A flaw was discovered in Unbound’s DNSSEC validator can leave it using an invalid memory pointer after certain DS sub-query validations fail due to NSEC3 budget exhaustion. This may cause crashes and could potentially allow arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:unbound-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Unbound, a Domain Name System (DNS) resolver. A remote attacker could trigger a heap overflow by sending specially crafted DNS reply packets. This occurs when Unbound attempts to encode multiple Name Server Identifier (NSID) or Extension Mechanisms for DNS (EDNS) Cookie options, or EDNS Padding options, and these options are enabled. Successful exploitation of this vulnerability could lead to a denial of service (DoS), making the Unbound service unavailable.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:unbound-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in Unbound's DNSSEC validator when constructing chase-reply messages for validation. The code uses the wrong counter to calculate write offsets for ADDITIONAL section resource record sets. When a DNAME chain is combined with authority filtering, an uninitialized array slot is created that the validator later dereferences, causing an immediate process crash. Any application or infrastructure relying on Unbound for DNS resolution could be forced to exit unexpectedly, resulting in a denial-of-service condition.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:unbound-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:unbound-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\nunbound:\n * python3-unbound-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-anchor-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-devel-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-dracut-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-libs-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-munin-1.25.1-0.1.hum1 (noarch)\n * unbound-utils-1.25.1-0.1.hum1 (aarch64, x86_64)\n * unbound-1.25.1-0.1.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:19752",
"url": "https://access.redhat.com/errata/RHSA-2026:19752"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-42959",
"url": "https://access.redhat.com/security/cve/CVE-2026-42959"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-33278",
"url": "https://access.redhat.com/security/cve/CVE-2026-33278"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-42944",
"url": "https://access.redhat.com/security/cve/CVE-2026-42944"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_19752.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-21T02:25:37+00:00",
"generator": {
"date": "2026-05-21T02:25:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:19752",
"initial_release_date": "2026-05-20T17:20:01+00:00",
"revision_history": [
{
"date": "2026-05-20T17:20:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-20T18:18:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-21T02:25:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "unbound-main@aarch64",
"product": {
"name": "unbound-main@aarch64",
"product_id": "unbound-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-unbound@1.25.1-0.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "unbound-main@x86_64",
"product": {
"name": "unbound-main@x86_64",
"product_id": "unbound-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-unbound@1.25.1-0.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "unbound-main@src",
"product": {
"name": "unbound-main@src",
"product_id": "unbound-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/unbound@1.25.1-0.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "unbound-main@noarch",
"product": {
"name": "unbound-main@noarch",
"product_id": "unbound-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/unbound-munin@1.25.1-0.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "unbound-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:unbound-main@aarch64"
},
"product_reference": "unbound-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "unbound-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:unbound-main@noarch"
},
"product_reference": "unbound-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "unbound-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:unbound-main@src"
},
"product_reference": "unbound-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "unbound-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:unbound-main@x86_64"
},
"product_reference": "unbound-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qifan Zhang"
],
"organization": "Palo Alto"
}
],
"cve": "CVE-2026-33278",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2026-05-19T11:46:56.937000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2479808"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in Unbound\u2019s DNSSEC validator can leave it using an invalid memory pointer after certain DS sub-query validations fail due to NSEC3 budget exhaustion. This may cause crashes and could potentially allow arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound DNSSEC Validator Use-After-Free via Deep Copy Pointer Overwrite Leading to DoS and Possible Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-33278"
},
{
"category": "external",
"summary": "RHBZ#2479808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2479808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-33278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33278"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-33278",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33278"
}
],
"release_date": "2026-05-20T11:33:59.504000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-20T17:20:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19752"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound DNSSEC Validator Use-After-Free via Deep Copy Pointer Overwrite Leading to DoS and Possible Remote Code Execution"
},
{
"cve": "CVE-2026-42944",
"discovery_date": "2026-05-19T09:59:55.126000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2479774"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Unbound, a Domain Name System (DNS) resolver. A remote attacker could trigger a heap overflow by sending specially crafted DNS reply packets. This occurs when Unbound attempts to encode multiple Name Server Identifier (NSID) or Extension Mechanisms for DNS (EDNS) Cookie options, or EDNS Padding options, and these options are enabled. Successful exploitation of this vulnerability could lead to a denial of service (DoS), making the Unbound service unavailable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Heap overflow and crash with multiple nsid, cookie, padding EDNS options",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-42944"
},
{
"category": "external",
"summary": "RHBZ#2479774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2479774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-42944",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-42944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42944"
}
],
"release_date": "2026-05-20T11:33:22.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-20T17:20:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19752"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Heap overflow and crash with multiple nsid, cookie, padding EDNS options"
},
{
"acknowledgments": [
{
"names": [
"Qifan Zhang"
],
"organization": "Palo Alto"
}
],
"cve": "CVE-2026-42959",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"discovery_date": "2026-05-19T11:23:24.234000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2479806"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Unbound\u0027s DNSSEC validator when constructing chase-reply messages for validation. The code uses the wrong counter to calculate write offsets for ADDITIONAL section resource record sets. When a DNAME chain is combined with authority filtering, an uninitialized array slot is created that the validator later dereferences, causing an immediate process crash. Any application or infrastructure relying on Unbound for DNS resolution could be forced to exit unexpectedly, resulting in a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound DNSSEC Validator Denial of Service via Incorrect Write Offset Counter in Chase-Reply Messages",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Important, given that it can be remotely triggered without authentication or user interaction via a single crafted DNS query. Successful exploitation allows an attacker to crash the Unbound resolver process, disrupting DNS resolution for all dependent services. The vulnerability\u0027s root cause is the use of incorrect counters to calculate write offsets, leading to dereference of an uninitialized pointer and subsequent denial-of-service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-42959"
},
{
"category": "external",
"summary": "RHBZ#2479806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2479806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-42959",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42959"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-42959",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-42959"
}
],
"release_date": "2026-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-20T17:20:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:19752"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:unbound-main@aarch64",
"Red Hat Hardened Images:unbound-main@noarch",
"Red Hat Hardened Images:unbound-main@src",
"Red Hat Hardened Images:unbound-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound DNSSEC Validator Denial of Service via Incorrect Write Offset Counter in Chase-Reply Messages"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.