suse-su-2025:20126-1
Vulnerability from csaf_suse
Published
2025-02-13 12:16
Modified
2025-02-13 12:16
Summary
Security update for unbound
Notes
Title of the patch
Security update for unbound
Description of the patch
This update for unbound fixes the following issues:
- Update to 1.22.0:
Features:
* Add iter-scrub-ns, iter-scrub-cname and max-global-quota
configuration options.
* Merge patch to fix for glue that is outside of zone, with
`harden-unverified-glue`, from Karthik Umashankar (Microsoft).
Enabling this option protects the Unbound resolver against bad
glue, that is unverified out of zone glue, by resolving them.
It uses the records as last resort if there is no other working
glue.
* Add redis-command-timeout: 20 and redis-connect-timeout: 200,
that can set the timeout separately for commands and the
connection set up to the redis server. If they are not
specified, the redis-timeout value is used.
* Log timestamps in ISO8601 format with timezone. This adds the
option `log-time-iso: yes` that logs in ISO8601 format.
* DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m`
that enable dnsoverquic, and the counters `num.query.quic` and
`mem.quic` in the statistics output. The feature needs to be
enabled by compiling with libngtcp2, with
`--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass
that with `--with-ssl=path` to compile unbound as well.
Bug Fixes:
* unbound-control-setup hangs while testing for openssl presence
starting from version 1.21.0.
* Fix error: "memory exhausted" when defining more than 9994
local-zones.
* Fix documentation for cache_fill_missing function.
* Fix Loads of logs: "validation failure: key for validation
<domain>. is marked as invalid because of a previous" for
non-DNSSEC signed zone.
* Fix that when rpz is applied the message does not get picked up
by the validator. That stops validation failures for the
message.
* Fix that stub-zone and forward-zone clauses do not exhaust
memory for long content.
* Fix to print port number in logs for auth zone transfer
activities.
* b.root renumbering.
* Add new IANA trust anchor.
* Fix config file read for dnstap-sample-rate.
* Fix alloc-size and calloc-transposed-args compiler warnings.
* Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled
(RFC9077).
* Fix dns64 with prefetch that the prefetch is stored in cache.
* Attempt to further fix doh_downstream_buffer_size.tdir
flakiness.
* More clear text for prefetch and minimal-responses in the
unbound.conf man page.
* Fix cache update when serve expired is used. Expired records
are favored over resolution and validation failures when
serve-expired is used.
* Fix negative cache NSEC3 parameter compares for zero length
NSEC3 salt.
* Fix unbound-control-setup hangs sometimes depending on the
openssl version.
* Fix Cannot override tcp-upstream and tls-upstream with
forward-tcp-upstream and forward-tls-upstream.
* Fix to limit NSEC TTL for messages from cachedb. Fix to limit
the prefetch ttl for messages after a CNAME with short TTL.
* Fix to disable detection of quic configured ports when quic is
not compiled in.
* Fix harden-unverified-glue for AAAA cache_fill_missing lookups.
* Fix contrib/aaaa-filter-iterator for change in call
signature for cache_fill_missing.
* Fix to display warning if quic-port is set but dnsoverquic is
not enabled when compiled.
* Fix dnsoverquic to extend the number of streams when one is
closed.
* Fix for dnstap with dnscrypt and dnstap without dnsoverquic.
* Fix for dnsoverquic and dnstap to use the correct dnstap
environment.
- Update to 1.21.1:
Security Fixes:
* CVE-2024-8508: unbounded name compression could lead to
denial of service. (bsc#1231284)
Patchnames
SUSE-SLE-Micro-6.0-213
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for unbound", "title": "Title of the patch" }, { "category": "description", "text": "This update for unbound fixes the following issues:\n\n- Update to 1.22.0:\n Features:\n * Add iter-scrub-ns, iter-scrub-cname and max-global-quota\n configuration options.\n * Merge patch to fix for glue that is outside of zone, with\n `harden-unverified-glue`, from Karthik Umashankar (Microsoft).\n Enabling this option protects the Unbound resolver against bad\n glue, that is unverified out of zone glue, by resolving them.\n It uses the records as last resort if there is no other working\n glue.\n * Add redis-command-timeout: 20 and redis-connect-timeout: 200,\n that can set the timeout separately for commands and the\n connection set up to the redis server. If they are not\n specified, the redis-timeout value is used.\n * Log timestamps in ISO8601 format with timezone. This adds the\n option `log-time-iso: yes` that logs in ISO8601 format.\n * DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m`\n that enable dnsoverquic, and the counters `num.query.quic` and\n `mem.quic` in the statistics output. The feature needs to be\n enabled by compiling with libngtcp2, with\n `--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass\n that with `--with-ssl=path` to compile unbound as well.\n\n Bug Fixes:\n * unbound-control-setup hangs while testing for openssl presence\n starting from version 1.21.0.\n * Fix error: \"memory exhausted\" when defining more than 9994\n local-zones.\n * Fix documentation for cache_fill_missing function.\n * Fix Loads of logs: \"validation failure: key for validation\n \u003cdomain\u003e. is marked as invalid because of a previous\" for\n non-DNSSEC signed zone.\n * Fix that when rpz is applied the message does not get picked up\n by the validator. That stops validation failures for the\n message.\n * Fix that stub-zone and forward-zone clauses do not exhaust\n memory for long content.\n * Fix to print port number in logs for auth zone transfer\n activities.\n * b.root renumbering.\n * Add new IANA trust anchor.\n * Fix config file read for dnstap-sample-rate.\n * Fix alloc-size and calloc-transposed-args compiler warnings.\n * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled\n (RFC9077).\n * Fix dns64 with prefetch that the prefetch is stored in cache.\n * Attempt to further fix doh_downstream_buffer_size.tdir\n flakiness.\n * More clear text for prefetch and minimal-responses in the\n unbound.conf man page.\n * Fix cache update when serve expired is used. Expired records\n are favored over resolution and validation failures when\n serve-expired is used.\n * Fix negative cache NSEC3 parameter compares for zero length\n NSEC3 salt.\n * Fix unbound-control-setup hangs sometimes depending on the\n openssl version.\n * Fix Cannot override tcp-upstream and tls-upstream with\n forward-tcp-upstream and forward-tls-upstream.\n * Fix to limit NSEC TTL for messages from cachedb. Fix to limit\n the prefetch ttl for messages after a CNAME with short TTL.\n * Fix to disable detection of quic configured ports when quic is\n not compiled in.\n * Fix harden-unverified-glue for AAAA cache_fill_missing lookups.\n * Fix contrib/aaaa-filter-iterator for change in call\n signature for cache_fill_missing.\n * Fix to display warning if quic-port is set but dnsoverquic is\n not enabled when compiled.\n * Fix dnsoverquic to extend the number of streams when one is\n closed.\n * Fix for dnstap with dnscrypt and dnstap without dnsoverquic.\n * Fix for dnsoverquic and dnstap to use the correct dnstap\n environment.\n\n- Update to 1.21.1:\n Security Fixes:\n * CVE-2024-8508: unbounded name compression could lead to\n denial of service. (bsc#1231284)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Micro-6.0-213", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20126-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:20126-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520126-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:20126-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021204.html" }, { "category": "self", "summary": "SUSE Bug 1231284", "url": "https://bugzilla.suse.com/1231284" }, { "category": "self", "summary": "SUSE CVE CVE-2024-8508 page", "url": "https://www.suse.com/security/cve/CVE-2024-8508/" } ], "title": "Security update for unbound", "tracking": { "current_release_date": "2025-02-13T12:16:23Z", "generator": { "date": "2025-02-13T12:16:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:20126-1", "initial_release_date": "2025-02-13T12:16:23Z", "revision_history": [ { "date": "2025-02-13T12:16:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libunbound8-1.22.0-1.1.aarch64", "product": { "name": "libunbound8-1.22.0-1.1.aarch64", "product_id": "libunbound8-1.22.0-1.1.aarch64" } }, { "category": "product_version", "name": "unbound-anchor-1.22.0-1.1.aarch64", "product": { "name": "unbound-anchor-1.22.0-1.1.aarch64", "product_id": "unbound-anchor-1.22.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libunbound8-1.22.0-1.1.s390x", "product": { "name": "libunbound8-1.22.0-1.1.s390x", "product_id": "libunbound8-1.22.0-1.1.s390x" } }, { "category": "product_version", "name": "unbound-anchor-1.22.0-1.1.s390x", "product": { "name": "unbound-anchor-1.22.0-1.1.s390x", "product_id": "unbound-anchor-1.22.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libunbound8-1.22.0-1.1.x86_64", "product": { "name": "libunbound8-1.22.0-1.1.x86_64", "product_id": "libunbound8-1.22.0-1.1.x86_64" } }, { "category": "product_version", "name": "unbound-anchor-1.22.0-1.1.x86_64", "product": { "name": "unbound-anchor-1.22.0-1.1.x86_64", "product_id": "unbound-anchor-1.22.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Micro 6.0", "product": { "name": "SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0", "product_identification_helper": { "cpe": "cpe:/o:suse:sl-micro:6.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libunbound8-1.22.0-1.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.aarch64" }, "product_reference": "libunbound8-1.22.0-1.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libunbound8-1.22.0-1.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.s390x" }, "product_reference": "libunbound8-1.22.0-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "libunbound8-1.22.0-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.x86_64" }, "product_reference": "libunbound8-1.22.0-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "unbound-anchor-1.22.0-1.1.aarch64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.aarch64" }, "product_reference": "unbound-anchor-1.22.0-1.1.aarch64", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "unbound-anchor-1.22.0-1.1.s390x as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.s390x" }, "product_reference": "unbound-anchor-1.22.0-1.1.s390x", "relates_to_product_reference": "SUSE Linux Micro 6.0" }, { "category": "default_component_of", "full_product_name": { "name": "unbound-anchor-1.22.0-1.1.x86_64 as component of SUSE Linux Micro 6.0", "product_id": "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.x86_64" }, "product_reference": "unbound-anchor-1.22.0-1.1.x86_64", "relates_to_product_reference": "SUSE Linux Micro 6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-8508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-8508" } ], "notes": [ { "category": "general", "text": "NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.x86_64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-8508", "url": "https://www.suse.com/security/cve/CVE-2024-8508" }, { "category": "external", "summary": "SUSE Bug 1231284 for CVE-2024-8508", "url": "https://bugzilla.suse.com/1231284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.x86_64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1.x86_64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.aarch64", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.s390x", "SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-13T12:16:23Z", "details": "moderate" } ], "title": "CVE-2024-8508" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…