Security update for unbound
Announcement ID: | SUSE-SU-2022:0301-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities and has three security fixes can now be installed.
Description:
This update for unbound fixes the following issues:
- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server ESPOS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-301=1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-301=1
-
SUSE Linux Enterprise Server 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-301=1
-
SUSE Linux Enterprise Server for SAP Applications 15
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-301=1
Package List:
-
SUSE Linux Enterprise Server ESPOS 15 (aarch64 x86_64)
- libunbound2-debuginfo-1.6.8-3.9.1
- unbound-debuginfo-1.6.8-3.9.1
- unbound-anchor-debuginfo-1.6.8-3.9.1
- unbound-anchor-1.6.8-3.9.1
- libunbound2-1.6.8-3.9.1
- unbound-devel-1.6.8-3.9.1
- unbound-debugsource-1.6.8-3.9.1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15 (aarch64 x86_64)
- libunbound2-debuginfo-1.6.8-3.9.1
- unbound-debuginfo-1.6.8-3.9.1
- unbound-anchor-debuginfo-1.6.8-3.9.1
- unbound-anchor-1.6.8-3.9.1
- libunbound2-1.6.8-3.9.1
- unbound-devel-1.6.8-3.9.1
- unbound-debugsource-1.6.8-3.9.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (aarch64 ppc64le s390x x86_64)
- libunbound2-debuginfo-1.6.8-3.9.1
- unbound-debuginfo-1.6.8-3.9.1
- unbound-anchor-debuginfo-1.6.8-3.9.1
- unbound-anchor-1.6.8-3.9.1
- libunbound2-1.6.8-3.9.1
- unbound-devel-1.6.8-3.9.1
- unbound-debugsource-1.6.8-3.9.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (ppc64le x86_64)
- libunbound2-debuginfo-1.6.8-3.9.1
- unbound-debuginfo-1.6.8-3.9.1
- unbound-anchor-debuginfo-1.6.8-3.9.1
- unbound-anchor-1.6.8-3.9.1
- libunbound2-1.6.8-3.9.1
- unbound-devel-1.6.8-3.9.1
- unbound-debugsource-1.6.8-3.9.1
References:
- https://www.suse.com/security/cve/CVE-2019-25031.html
- https://www.suse.com/security/cve/CVE-2019-25032.html
- https://www.suse.com/security/cve/CVE-2019-25033.html
- https://www.suse.com/security/cve/CVE-2019-25034.html
- https://www.suse.com/security/cve/CVE-2019-25035.html
- https://www.suse.com/security/cve/CVE-2019-25036.html
- https://www.suse.com/security/cve/CVE-2019-25037.html
- https://www.suse.com/security/cve/CVE-2019-25038.html
- https://www.suse.com/security/cve/CVE-2019-25039.html
- https://www.suse.com/security/cve/CVE-2019-25040.html
- https://www.suse.com/security/cve/CVE-2019-25041.html
- https://www.suse.com/security/cve/CVE-2019-25042.html
- https://www.suse.com/security/cve/CVE-2020-28935.html
- https://bugzilla.suse.com/show_bug.cgi?id=1076963
- https://bugzilla.suse.com/show_bug.cgi?id=1112009
- https://bugzilla.suse.com/show_bug.cgi?id=1112033
- https://bugzilla.suse.com/show_bug.cgi?id=1179191
- https://bugzilla.suse.com/show_bug.cgi?id=1185382
- https://bugzilla.suse.com/show_bug.cgi?id=1185383
- https://bugzilla.suse.com/show_bug.cgi?id=1185384
- https://bugzilla.suse.com/show_bug.cgi?id=1185385
- https://bugzilla.suse.com/show_bug.cgi?id=1185386
- https://bugzilla.suse.com/show_bug.cgi?id=1185387
- https://bugzilla.suse.com/show_bug.cgi?id=1185388
- https://bugzilla.suse.com/show_bug.cgi?id=1185389
- https://bugzilla.suse.com/show_bug.cgi?id=1185390
- https://bugzilla.suse.com/show_bug.cgi?id=1185391
- https://bugzilla.suse.com/show_bug.cgi?id=1185392
- https://bugzilla.suse.com/show_bug.cgi?id=1185393