An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1836
Final
1.0
1.0
2022-08-13
Initial
2022-08-13
2022-08-13
openEuler SA Tool V1.0
2022-08-13
unbound security update
An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
Unbound is a validating, recursive, caching DNS resolver. It is designed to be fast and lean and incorporates modern features based on open standards.To help increase online privacy, Unbound supports DNS-over-TLS which allows clients to encrypt their communication. Unbound is available for most platforms such as FreeBSD, OpenBSD, NetBSD, MacOS, Linux and Microsoft Windows.Unbound is a totally free, open source software under the BSD license. It doesn'tmake custom builds or provide specific features to paying customers only.
Security Fix(es):
NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.(CVE-2022-30698)
NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.(CVE-2022-30699)
An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
unbound
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-30698
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-30699
https://nvd.nist.gov/vuln/detail/CVE-2022-30698
https://nvd.nist.gov/vuln/detail/CVE-2022-30699
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
unbound-debugsource-1.11.0-7.oe1.aarch64.rpm
python3-unbound-1.11.0-7.oe1.aarch64.rpm
unbound-debuginfo-1.11.0-7.oe1.aarch64.rpm
unbound-help-1.11.0-7.oe1.aarch64.rpm
unbound-libs-1.11.0-7.oe1.aarch64.rpm
unbound-devel-1.11.0-7.oe1.aarch64.rpm
unbound-1.11.0-7.oe1.aarch64.rpm
unbound-help-1.11.0-6.oe1.aarch64.rpm
unbound-1.11.0-6.oe1.aarch64.rpm
unbound-debugsource-1.11.0-6.oe1.aarch64.rpm
python3-unbound-1.11.0-6.oe1.aarch64.rpm
unbound-libs-1.11.0-6.oe1.aarch64.rpm
unbound-devel-1.11.0-6.oe1.aarch64.rpm
unbound-debuginfo-1.11.0-6.oe1.aarch64.rpm
unbound-debuginfo-1.13.2-5.oe2203.aarch64.rpm
unbound-help-1.13.2-5.oe2203.aarch64.rpm
unbound-1.13.2-5.oe2203.aarch64.rpm
unbound-devel-1.13.2-5.oe2203.aarch64.rpm
python3-unbound-1.13.2-5.oe2203.aarch64.rpm
unbound-debugsource-1.13.2-5.oe2203.aarch64.rpm
unbound-libs-1.13.2-5.oe2203.aarch64.rpm
unbound-1.11.0-7.oe1.src.rpm
unbound-1.11.0-6.oe1.src.rpm
unbound-1.13.2-5.oe2203.src.rpm
unbound-debugsource-1.11.0-7.oe1.x86_64.rpm
python3-unbound-1.11.0-7.oe1.x86_64.rpm
unbound-devel-1.11.0-7.oe1.x86_64.rpm
unbound-1.11.0-7.oe1.x86_64.rpm
unbound-help-1.11.0-7.oe1.x86_64.rpm
unbound-debuginfo-1.11.0-7.oe1.x86_64.rpm
unbound-libs-1.11.0-7.oe1.x86_64.rpm
unbound-1.11.0-6.oe1.x86_64.rpm
unbound-libs-1.11.0-6.oe1.x86_64.rpm
python3-unbound-1.11.0-6.oe1.x86_64.rpm
unbound-help-1.11.0-6.oe1.x86_64.rpm
unbound-devel-1.11.0-6.oe1.x86_64.rpm
unbound-debugsource-1.11.0-6.oe1.x86_64.rpm
unbound-debuginfo-1.11.0-6.oe1.x86_64.rpm
unbound-debugsource-1.13.2-5.oe2203.x86_64.rpm
unbound-help-1.13.2-5.oe2203.x86_64.rpm
unbound-debuginfo-1.13.2-5.oe2203.x86_64.rpm
unbound-devel-1.13.2-5.oe2203.x86_64.rpm
python3-unbound-1.13.2-5.oe2203.x86_64.rpm
unbound-libs-1.13.2-5.oe2203.x86_64.rpm
unbound-1.13.2-5.oe2203.x86_64.rpm
NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound s delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.
2022-08-13
CVE-2022-30698
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Medium
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
unbound security update
2022-08-13
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836
NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.
2022-08-13
CVE-2022-30699
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Medium
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
unbound security update
2022-08-13
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836