Fix KeyTrap - Extreme CPU consumption in DNSSEC validator CVE-2023-50387
Fix Preparing an NSEC3 closest encloser proof can exhaust CPU resources CVE-2023-50868 ; Resolves: CVE-2023-50868 CVE-2023-50387 Resolves: RHEL-25423 RHEL-25428
This commit is contained in:
parent
ea6641209d
commit
2e13c8f8db
2304
unbound-1.16-CVE-2023-50387-CVE-2023-50868.patch
Normal file
2304
unbound-1.16-CVE-2023-50387-CVE-2023-50868.patch
Normal file
File diff suppressed because it is too large
Load Diff
11
unbound.spec
11
unbound.spec
@ -34,7 +34,7 @@
|
|||||||
Summary: Validating, recursive, and caching DNS(SEC) resolver
|
Summary: Validating, recursive, and caching DNS(SEC) resolver
|
||||||
Name: unbound
|
Name: unbound
|
||||||
Version: 1.16.2
|
Version: 1.16.2
|
||||||
Release: 5%{?extra_version:.%{extra_version}}%{?dist}
|
Release: 5.1%{?extra_version:.%{extra_version}}%{?dist}
|
||||||
License: BSD
|
License: BSD
|
||||||
Url: https://www.unbound.net/
|
Url: https://www.unbound.net/
|
||||||
Source: https://www.unbound.net/downloads/%{name}-%{version}%{?extra_version}.tar.gz
|
Source: https://www.unbound.net/downloads/%{name}-%{version}%{?extra_version}.tar.gz
|
||||||
@ -62,6 +62,8 @@ Patch1: unbound-1.15-soversion2-compat.patch
|
|||||||
Patch2: unbound-1.15-source-compat.patch
|
Patch2: unbound-1.15-source-compat.patch
|
||||||
# https://github.com/NLnetLabs/unbound/commit/137719522a8ea5b380fbb6206d2466f402f5b554
|
# https://github.com/NLnetLabs/unbound/commit/137719522a8ea5b380fbb6206d2466f402f5b554
|
||||||
Patch3: unbound-1.16-CVE-2022-3204.patch
|
Patch3: unbound-1.16-CVE-2022-3204.patch
|
||||||
|
# https://nlnetlabs.nl/downloads/unbound/patch_CVE-2023-50387_CVE-2023-50868.diff
|
||||||
|
Patch4: unbound-1.16-CVE-2023-50387-CVE-2023-50868.patch
|
||||||
|
|
||||||
BuildRequires: gdb
|
BuildRequires: gdb
|
||||||
BuildRequires: gcc, make
|
BuildRequires: gcc, make
|
||||||
@ -164,6 +166,7 @@ pushd %{pkgname}
|
|||||||
%patch1 -p2 -b .solib2-compat
|
%patch1 -p2 -b .solib2-compat
|
||||||
%patch2 -p1 -b .srccompat
|
%patch2 -p1 -b .srccompat
|
||||||
%patch3 -p2 -b .CVE-2022-3204
|
%patch3 -p2 -b .CVE-2022-3204
|
||||||
|
%patch4 -p2 -b .CVE-2023-50387-CVE-2023-50868
|
||||||
|
|
||||||
|
|
||||||
# copy common doc files - after here, since it may be patched
|
# copy common doc files - after here, since it may be patched
|
||||||
@ -430,6 +433,12 @@ popd
|
|||||||
%verify(not md5 size mtime) %{_sharedstatedir}/%{name}/root.key
|
%verify(not md5 size mtime) %{_sharedstatedir}/%{name}/root.key
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Feb 16 2024 Tomas Korbar <tkorbar@redhat.com> - 1.16.2-5.1
|
||||||
|
- Fix KeyTrap - Extreme CPU consumption in DNSSEC validator CVE-2023-50387
|
||||||
|
- Fix Preparing an NSEC3 closest encloser proof can exhaust CPU resources CVE-2023-50868
|
||||||
|
- Resolves: RHEL-25428
|
||||||
|
- Resolves: RHEL-25423
|
||||||
|
|
||||||
* Sat Oct 15 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-5
|
* Sat Oct 15 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-5
|
||||||
- Stop creating wrong devel manual pages (#2135322)
|
- Stop creating wrong devel manual pages (#2135322)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user