The attack can cause a resolver to spend a lot of time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It can trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation. This can lead to degraded performance and eventually denial of service in orchestrated attacks. Upstream has issued an advisory today (September 21): https://nlnetlabs.nl/downloads/unbound/CVE-2022-3204.txt The issue is fixed upstream in 1.16.3: https://github.com/NLnetLabs/unbound/releases/tag/release-1.16.3
Created unbound tracking bugs for this issue: Affects: fedora-all [bug 2128953]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2370 https://access.redhat.com/errata/RHSA-2023:2370
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2771 https://access.redhat.com/errata/RHSA-2023:2771
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-3204