-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2024-2e26eccfcb 2024-02-18 00:54:44.562570 --------------------------------------------------------------------------------
Name : unbound Product : Fedora 39 Version : 1.19.1 Release : 2.fc39 URL : https://nlnetlabs.nl/projects/unbound/ Summary : Validating, recursive, and caching DNS(SEC) resolver Description : Unbound is a validating, recursive, and caching DNS(SEC) resolver.
The C implementation of Unbound is developed and maintained by NLnet Labs. It is based on ideas and algorithms taken from a java prototype developed by Verisign labs, Nominet, Kirei and ep.net.
Unbound is designed as a set of modular components, so that also DNSSEC (secure DNS) validation and stub-resolvers (that do not run as a server, but are linked into an application) are easily possible.
-------------------------------------------------------------------------------- Update Information:
https://nlnetlabs.nl/projects/unbound/security-advisories/ Secure again control channel. -------------------------------------------------------------------------------- ChangeLog:
* Tue Feb 13 2024 Petr Men����k pemensik@redhat.com - 1.19.1-2 - Ensure only unbound group members can make changes * Tue Feb 13 2024 Paul Wouters paul.wouters@aiven.io - 1.19.1-1 - Update to 1.19.1 for CVE-2023-50387, CVE-2023-50868 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2264029 - unbound-1.19.1 is available https://bugzilla.redhat.com/show_bug.cgi?id=2264029 [ 2 ] Bug #2264101 - CVE-2023-50868 unbound: bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2264101 [ 3 ] Bug #2264104 - CVE-2023-50387 unbound: bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2264104 [ 4 ] Bug #2264184 - unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2264184 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-2e26eccfcb' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------