You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa unbound

Sigurnosni nedostaci programskog paketa unbound

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-8e9b62948e
2020-05-28 01:59:14.571950
——————————————————————————–

Name : unbound
Product : Fedora 31
Version : 1.10.1
Release : 1.fc31
URL : https://nlnetlabs.nl/projects/unbound/
Summary : Validating, recursive, and caching DNS(SEC) resolver
Description :
Unbound is a validating, recursive, and caching DNS(SEC) resolver.

The C implementation of Unbound is developed and maintained by NLnet
Labs. It is based on ideas and algorithms taken from a java prototype
developed by Verisign labs, Nominet, Kirei and ep.net.

Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run
as a server, but are linked into an application) are easily possible.

——————————————————————————–
Update Information:

Security fix for CVE-2020-12662 and CVE-2020-12663
——————————————————————————–
ChangeLog:

* Tue May 19 2020 Paul Wouters <pwouters@redhat.com> – 1.10.1-1
– Resolves: rhbz#1837279 unbound-1.10.1 is available
– Resolves: rhbz#1837598 CVE-2020-12662 unbound: insufficient control of network message volume leads to DoS
– Resolves: rhbz#1837609 CVE-2020-12663 unbound: infinite loop via malformed DNS answers received from upstream servers
– Updated unbound.conf for new options in 1.10.1
——————————————————————————–
References:

[ 1 ] Bug #1837597 – CVE-2020-12662 unbound: amplification of an incoming query into a large number of queries directed to a target
https://bugzilla.redhat.com/show_bug.cgi?id=1837597
[ 2 ] Bug #1837604 – CVE-2020-12663 unbound: infinite loop via malformed DNS answers received from upstream servers
https://bugzilla.redhat.com/show_bug.cgi?id=1837604
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-8e9b62948e’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorVlatka Misic
Cert idNCERT-REF-2020-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa dovecot

Otkriveni su sigurnosni nedostaci u programskom paketu dovecot za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem...

Close