An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1836 Final 1.0 1.0 2022-08-13 Initial 2022-08-13 2022-08-13 openEuler SA Tool V1.0 2022-08-13 unbound security update An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. Unbound is a validating, recursive, caching DNS resolver. It is designed to be fast and lean and incorporates modern features based on open standards.To help increase online privacy, Unbound supports DNS-over-TLS which allows clients to encrypt their communication. Unbound is available for most platforms such as FreeBSD, OpenBSD, NetBSD, MacOS, Linux and Microsoft Windows.Unbound is a totally free, open source software under the BSD license. It doesn'tmake custom builds or provide specific features to paying customers only. Security Fix(es): NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.(CVE-2022-30698) NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.(CVE-2022-30699) An update for unbound is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium unbound https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-30698 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-30699 https://nvd.nist.gov/vuln/detail/CVE-2022-30698 https://nvd.nist.gov/vuln/detail/CVE-2022-30699 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS unbound-debugsource-1.11.0-7.oe1.aarch64.rpm python3-unbound-1.11.0-7.oe1.aarch64.rpm unbound-debuginfo-1.11.0-7.oe1.aarch64.rpm unbound-help-1.11.0-7.oe1.aarch64.rpm unbound-libs-1.11.0-7.oe1.aarch64.rpm unbound-devel-1.11.0-7.oe1.aarch64.rpm unbound-1.11.0-7.oe1.aarch64.rpm unbound-help-1.11.0-6.oe1.aarch64.rpm unbound-1.11.0-6.oe1.aarch64.rpm unbound-debugsource-1.11.0-6.oe1.aarch64.rpm python3-unbound-1.11.0-6.oe1.aarch64.rpm unbound-libs-1.11.0-6.oe1.aarch64.rpm unbound-devel-1.11.0-6.oe1.aarch64.rpm unbound-debuginfo-1.11.0-6.oe1.aarch64.rpm unbound-debuginfo-1.13.2-5.oe2203.aarch64.rpm unbound-help-1.13.2-5.oe2203.aarch64.rpm unbound-1.13.2-5.oe2203.aarch64.rpm unbound-devel-1.13.2-5.oe2203.aarch64.rpm python3-unbound-1.13.2-5.oe2203.aarch64.rpm unbound-debugsource-1.13.2-5.oe2203.aarch64.rpm unbound-libs-1.13.2-5.oe2203.aarch64.rpm unbound-1.11.0-7.oe1.src.rpm unbound-1.11.0-6.oe1.src.rpm unbound-1.13.2-5.oe2203.src.rpm unbound-debugsource-1.11.0-7.oe1.x86_64.rpm python3-unbound-1.11.0-7.oe1.x86_64.rpm unbound-devel-1.11.0-7.oe1.x86_64.rpm unbound-1.11.0-7.oe1.x86_64.rpm unbound-help-1.11.0-7.oe1.x86_64.rpm unbound-debuginfo-1.11.0-7.oe1.x86_64.rpm unbound-libs-1.11.0-7.oe1.x86_64.rpm unbound-1.11.0-6.oe1.x86_64.rpm unbound-libs-1.11.0-6.oe1.x86_64.rpm python3-unbound-1.11.0-6.oe1.x86_64.rpm unbound-help-1.11.0-6.oe1.x86_64.rpm unbound-devel-1.11.0-6.oe1.x86_64.rpm unbound-debugsource-1.11.0-6.oe1.x86_64.rpm unbound-debuginfo-1.11.0-6.oe1.x86_64.rpm unbound-debugsource-1.13.2-5.oe2203.x86_64.rpm unbound-help-1.13.2-5.oe2203.x86_64.rpm unbound-debuginfo-1.13.2-5.oe2203.x86_64.rpm unbound-devel-1.13.2-5.oe2203.x86_64.rpm python3-unbound-1.13.2-5.oe2203.x86_64.rpm unbound-libs-1.13.2-5.oe2203.x86_64.rpm unbound-1.13.2-5.oe2203.x86_64.rpm NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound s delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information. 2022-08-13 CVE-2022-30698 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Medium 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N unbound security update 2022-08-13 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836 NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten. 2022-08-13 CVE-2022-30699 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Medium 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N unbound security update 2022-08-13 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1836