SUSE-SU-2022:0176-2

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20220176-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:0176-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:0176-2
Related
Published
2022-02-15T06:39:05Z
Modified
2022-02-15T06:39:05Z
Summary
Security update for unbound
Details

This update for unbound fixes the following issues:

  • CVE-2019-25031: Fixed configuration injection in createunboundad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
  • CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
  • CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
  • CVE-2019-25034: Fixed integer overflow in sldnsstr2wirednamebuforigin, leading to an out-of-bounds write (bsc#1185385).
  • CVE-2019-25035: Fixed out-of-bounds write in sldnsbgettoken_par (bsc#1185386).
  • CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
  • CVE-2019-25037: Fixed assertion failure and denial of service in dnamepktcopy via an invalid packet (bsc#1185388).
  • CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
  • CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
  • CVE-2019-25040: Fixed infinite loop via a compressed name in dnamepktcopy (bsc#1185391).
  • CVE-2019-25041: Fixed assertion failure via a compressed name in dnamepktcopy (bsc#1185392).
  • CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
  • CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
References

Affected packages

SUSE:Linux Enterprise Real Time 15 SP2 / unbound

Package

Name
unbound
Purl
purl:rpm/suse/unbound&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.8-10.6.1

Ecosystem specific

{
    "binaries": [
        {
            "unbound-anchor": "1.6.8-10.6.1",
            "libunbound2": "1.6.8-10.6.1",
            "unbound-devel": "1.6.8-10.6.1"
        }
    ]
}