<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for unbound</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20126-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-13T12:16:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-13T12:16:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-13T12:16:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for unbound</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for unbound fixes the following issues:

- Update to 1.22.0:
  Features:
  * Add iter-scrub-ns, iter-scrub-cname and max-global-quota
    configuration options.
  * Merge patch to fix for glue that is outside of zone, with
    `harden-unverified-glue`, from Karthik Umashankar (Microsoft).
    Enabling this option protects the Unbound resolver against bad
    glue, that is unverified out of zone glue, by resolving them.
    It uses the records as last resort if there is no other working
    glue.
  * Add redis-command-timeout: 20 and redis-connect-timeout: 200,
    that can set the timeout separately for commands and the
    connection set up to the redis server. If they are not
    specified, the redis-timeout value is used.
  * Log timestamps in ISO8601 format with timezone. This adds the
    option `log-time-iso: yes` that logs in ISO8601 format.
  * DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m`
    that enable dnsoverquic, and the counters `num.query.quic` and
    `mem.quic` in the statistics output. The feature needs to be
    enabled by compiling with libngtcp2, with
    `--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass
    that with `--with-ssl=path` to compile unbound as well.

  Bug Fixes:
  * unbound-control-setup hangs while testing for openssl presence
    starting from version 1.21.0.
  * Fix error: "memory exhausted" when defining more than 9994
    local-zones.
  * Fix documentation for cache_fill_missing function.
  * Fix Loads of logs: "validation failure: key for validation
    &lt;domain&gt;. is marked as invalid because of a previous" for
    non-DNSSEC signed zone.
  * Fix that when rpz is applied the message does not get picked up
    by the validator. That stops validation failures for the
    message.
  * Fix that stub-zone and forward-zone clauses do not exhaust
    memory for long content.
  * Fix to print port number in logs for auth zone transfer
    activities.
  * b.root renumbering.
  * Add new IANA trust anchor.
  * Fix config file read for dnstap-sample-rate.
  * Fix alloc-size and calloc-transposed-args compiler warnings.
  * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled
    (RFC9077).
  * Fix dns64 with prefetch that the prefetch is stored in cache.
  * Attempt to further fix doh_downstream_buffer_size.tdir
    flakiness.
  * More clear text for prefetch and minimal-responses in the
    unbound.conf man page.
  * Fix cache update when serve expired is used. Expired records
    are favored over resolution and validation failures when
    serve-expired is used.
  * Fix negative cache NSEC3 parameter compares for zero length
    NSEC3 salt.
  * Fix unbound-control-setup hangs sometimes depending on the
    openssl version.
  * Fix Cannot override tcp-upstream and tls-upstream with
    forward-tcp-upstream and forward-tls-upstream.
  * Fix to limit NSEC TTL for messages from cachedb. Fix to limit
    the prefetch ttl for messages after a CNAME with short TTL.
  * Fix to disable detection of quic configured ports when quic is
    not compiled in.
  * Fix harden-unverified-glue for AAAA cache_fill_missing lookups.
  * Fix contrib/aaaa-filter-iterator for change in call
    signature for cache_fill_missing.
  * Fix to display warning if quic-port is set but dnsoverquic is
    not enabled when compiled.
  * Fix dnsoverquic to extend the number of streams when one is
    closed.
  * Fix for dnstap with dnscrypt and dnstap without dnsoverquic.
  * Fix for dnsoverquic and dnstap to use the correct dnstap
    environment.

- Update to 1.21.1:
  Security Fixes:
  * CVE-2024-8508: unbounded name compression could lead to
    denial of service. (bsc#1231284)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-213</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520126-1/</URL>
      <Description>Link for SUSE-SU-2025:20126-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021204.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20126-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231284</URL>
      <Description>SUSE Bug 1231284</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-8508/</URL>
      <Description>SUSE CVE CVE-2024-8508 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libunbound8-1.22.0-1.1">
      <FullProductName ProductID="libunbound8-1.22.0-1.1">libunbound8-1.22.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="unbound-anchor-1.22.0-1.1">
      <FullProductName ProductID="unbound-anchor-1.22.0-1.1">unbound-anchor-1.22.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libunbound8-1.22.0-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1">libunbound8-1.22.0-1.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="unbound-anchor-1.22.0-1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1">unbound-anchor-1.22.0-1.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.</Note>
    </Notes>
    <CVE>CVE-2024-8508</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:libunbound8-1.22.0-1.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:unbound-anchor-1.22.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520126-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-8508.html</URL>
        <Description>CVE-2024-8508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231284</URL>
        <Description>SUSE Bug 1231284</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
