Bug 1837604 (CVE-2020-12663)
Summary: | CVE-2020-12663 unbound: infinite loop via malformed DNS answers received from upstream servers | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | Petr Sklenar <psklenar> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aegorenk, akhaitov, pemensik, pj.pandit, pwouters, uwe.knop |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in unbound in versions prior to 1.10.1. An infinite loop can be created when malformed DNS answers are received from upstream servers. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-06-08 11:20:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1837609, 1840257, 1840258, 1840259, 1840260, 1840261, 1840262, 1840263, 1879513 | ||
Bug Blocks: | 1837616 |
Description
Guilherme de Almeida Suckevicz
2020-05-19 17:40:02 UTC
Created unbound tracking bugs for this issue: Affects: fedora-all [bug 1837609] In reply to comment #2: > Upstream fix: > https://github.com/NLnetLabs/unbound/commit/ > ba0f382eee814e56900a535778d13206b86b6d49 According to https://github.com/NLnetLabs/unbound/issues/243#issuecomment-637298509, the changes related to this particular CVE are only those in iterator/iter_scrub.c and util/data/dname.c. The other changes are for CVE-2020-12662. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:2414 https://access.redhat.com/errata/RHSA-2020:2414 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2416 https://access.redhat.com/errata/RHSA-2020:2416 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:2418 https://access.redhat.com/errata/RHSA-2020:2418 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2419 https://access.redhat.com/errata/RHSA-2020:2419 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12663 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:2640 https://access.redhat.com/errata/RHSA-2020:2640 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:4181 https://access.redhat.com/errata/RHSA-2020:4181 |