--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-2e26eccfcb
2024-02-18 00:54:44.562570
--------------------------------------------------------------------------------
Name : unbound
Product : Fedora 39
Version : 1.19.1
Release : 2.fc39
URL :
https://nlnetlabs.nl/projects/unbound/
Summary : Validating, recursive, and caching DNS(SEC) resolver
Description :
Unbound is a validating, recursive, and caching DNS(SEC) resolver.
The C implementation of Unbound is developed and maintained by NLnet
Labs. It is based on ideas and algorithms taken from a java prototype
developed by Verisign labs, Nominet, Kirei and
ep.net.
Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run
as a server, but are linked into an application) are easily possible.
--------------------------------------------------------------------------------
Update Information:
https://nlnetlabs.nl/projects/unbound/security-advisories/
Secure again control channel.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Feb 13 2024 Petr Men����k <pemensik(a)redhat.com> - 1.19.1-2
- Ensure only unbound group members can make changes
* Tue Feb 13 2024 Paul Wouters <paul.wouters(a)aiven.io> - 1.19.1-1
- Update to 1.19.1 for CVE-2023-50387, CVE-2023-50868
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2264029 - unbound-1.19.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2264029
[ 2 ] Bug #2264101 - CVE-2023-50868 unbound: bind9: Preparing an NSEC3 closest encloser
proof can exhaust CPU resources [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2264101
[ 3 ] Bug #2264104 - CVE-2023-50387 unbound: bind9: KeyTrap - Extreme CPU consumption in
DNSSEC validator [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2264104
[ 4 ] Bug #2264184 - unbound: unrestricted reconfiguration enabled to anyone that may
lead to local privilege escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2264184
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-2e26eccfcb' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------