{"id":"RLSA-2021:1853","summary":"Moderate: unbound security, bug fix, and enhancement update","details":"The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. \n\nSecurity Fix(es):\n\n* unbound: integer overflow in the regional allocator via regional_alloc (CVE-2019-25032)\n\n* unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write (CVE-2019-25034)\n\n* unbound: out-of-bounds write in sldns_bget_token_par (CVE-2019-25035)\n\n* unbound: assertion failure and denial of service in synth_cname (CVE-2019-25036)\n\n* unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet (CVE-2019-25037)\n\n* unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c (CVE-2019-25038)\n\n* unbound: integer overflow in a size calculation in respip/respip.c (CVE-2019-25039)\n\n* unbound: infinite loop via a compressed name in dname_pkt_copy (CVE-2019-25040)\n\n* unbound: assertion failure via a compressed name in dname_pkt_copy (CVE-2019-25041)\n\n* unbound: out-of-bounds write via a compressed name in rdata_copy (CVE-2019-25042)\n\n* unbound: symbolic link traversal when writing PID file (CVE-2020-28935)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.","modified":"2026-03-11T05:55:52.278077Z","published":"2021-05-18T06:15:09Z","upstream":["CVE-2019-25032","CVE-2019-25034","CVE-2019-25035","CVE-2019-25036","CVE-2019-25037","CVE-2019-25038","CVE-2019-25039","CVE-2019-25040","CVE-2019-25041","CVE-2019-25042","CVE-2020-28935"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2021:1853"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1714175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1842837"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850460"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1878761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954772"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954794"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954796"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954799"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954801"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954804"}],"affected":[{"package":{"name":"unbound","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/unbound?distro=rocky-linux-8-4-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.3-15.el8"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2021:1853.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}