Bug 1954801 (CVE-2019-25041)
Summary: | CVE-2019-25041 unbound: assertion failure via a compressed name in dname_pkt_copy | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aegorenk, akhaitovich, paul.wouters, pemensik, pj.pandit |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | unbound 1.9.6 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in unbound. A reachable assertion in the dname_pkt_copy function can be triggered through compressed names. The highest threat from this vulnerability is to service availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-05-18 20:39:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1859933, 1968662, 1968663, 1968664 | ||
Bug Blocks: | 1954811 |
Description
Guilherme de Almeida Suckevicz
2021-04-28 19:10:39 UTC
Upstream patch: https://github.com/NLnetLabs/unbound/commit/2d444a5037acff6024630b88092d9188f2f5d8fe Statement: According to the original report there are checks happening before the affected function that make this not exploitable. For these reasons its Impact is Moderate. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1853 https://access.redhat.com/errata/RHSA-2021:1853 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-25041 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0632 https://access.redhat.com/errata/RHSA-2022:0632 |