QID 239293
Date Published: 2021-05-24
QID 239293: Red Hat Update for unbound (RHSA-2021:1853)
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es): unbound: integer overflow in the regional allocator via regional_alloc (CVE-2019-25032) unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write (CVE-2019-25034) unbound: out-of-bounds write in sldns_bget_token_par (CVE-2019-25035) unbound: assertion failure and denial of service in synth_cname (CVE-2019-25036) unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet (CVE-2019-25037) unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c (CVE-2019-25038) unbound: integer overflow in a size calculation in respip/respip.c (CVE-2019-25039) unbound: infinite loop via a compressed name in dname_pkt_copy (CVE-2019-25040) unbound: assertion failure via a compressed name in dname_pkt_copy (CVE-2019-25041) unbound: out-of-bounds write via a compressed name in rdata_copy (CVE-2019-25042) unbound: symbolic link traversal when writing PID file (CVE-2020-28935)
Affected Products:
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Enterprise Linux for IBM z Systems 8 s390x
Red Hat Enterprise Linux for Power, little endian 8 ppc64le
Red Hat Enterprise Linux for ARM 64 8 aarch64
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
On successful exploitation, it could allow an attacker to execute code.
Refer to Red Hat security advisory RHSA-2021:1853 to address this issue and obtain more information.
- RHSA-2021:1853 -
access.redhat.com/errata/RHSA-2021:1853?language=en
CVEs related to QID 239293
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2021:1853 | Red Hat Enterprise Linux |
|