import UBI unbound-1.16.2-8.el9_5.1
This commit is contained in:
parent
3b1d4e64fd
commit
99513ddefa
249
SOURCES/unbound-1.21-CVE-2024-8508.patch
Normal file
249
SOURCES/unbound-1.21-CVE-2024-8508.patch
Normal file
@ -0,0 +1,249 @@
|
|||||||
|
From 34de24d58bb5aa6fe3551512fc17cac08f65d93e Mon Sep 17 00:00:00 2001
|
||||||
|
From: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
|
||||||
|
Date: Thu, 3 Oct 2024 14:46:57 +0200
|
||||||
|
Subject: [PATCH] - Fix CVE-2024-8508, unbounded name compression could lead to
|
||||||
|
denial of service.
|
||||||
|
|
||||||
|
---
|
||||||
|
unbound-1.16.2/util/data/msgencode.c | 77 +++++++++++++++++-----------
|
||||||
|
1 file changed, 46 insertions(+), 31 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/unbound-1.16.2/util/data/msgencode.c b/unbound-1.16.2/util/data/msgencode.c
|
||||||
|
index fe21cfb..f9e95e6 100644
|
||||||
|
--- a/unbound-1.16.2/util/data/msgencode.c
|
||||||
|
+++ b/unbound-1.16.2/util/data/msgencode.c
|
||||||
|
@@ -62,6 +62,10 @@
|
||||||
|
#define RETVAL_TRUNC -4
|
||||||
|
/** return code that means all is peachy keen. Equal to DNS rcode NOERROR */
|
||||||
|
#define RETVAL_OK 0
|
||||||
|
+/** Max compressions we are willing to perform; more than that will result
|
||||||
|
+ * in semi-compressed messages, or truncated even on TCP for huge messages, to
|
||||||
|
+ * avoid locking the CPU for long */
|
||||||
|
+#define MAX_COMPRESSION_PER_MESSAGE 120
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Data structure to help domain name compression in outgoing messages.
|
||||||
|
@@ -284,15 +288,17 @@ write_compressed_dname(sldns_buffer* pkt, uint8_t* dname, int labs,
|
||||||
|
|
||||||
|
/** compress owner name of RR, return RETVAL_OUTMEM RETVAL_TRUNC */
|
||||||
|
static int
|
||||||
|
-compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
- struct regional* region, struct compress_tree_node** tree,
|
||||||
|
- size_t owner_pos, uint16_t* owner_ptr, int owner_labs)
|
||||||
|
+compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
+ struct regional* region, struct compress_tree_node** tree,
|
||||||
|
+ size_t owner_pos, uint16_t* owner_ptr, int owner_labs,
|
||||||
|
+ size_t* compress_count)
|
||||||
|
{
|
||||||
|
struct compress_tree_node* p;
|
||||||
|
struct compress_tree_node** insertpt = NULL;
|
||||||
|
if(!*owner_ptr) {
|
||||||
|
/* compress first time dname */
|
||||||
|
- if((p = compress_tree_lookup(tree, key->rk.dname,
|
||||||
|
+ if(*compress_count < MAX_COMPRESSION_PER_MESSAGE &&
|
||||||
|
+ (p = compress_tree_lookup(tree, key->rk.dname,
|
||||||
|
owner_labs, &insertpt))) {
|
||||||
|
if(p->labs == owner_labs)
|
||||||
|
/* avoid ptr chains, since some software is
|
||||||
|
@@ -301,6 +307,7 @@ compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
if(!write_compressed_dname(pkt, key->rk.dname,
|
||||||
|
owner_labs, p))
|
||||||
|
return RETVAL_TRUNC;
|
||||||
|
+ (*compress_count)++;
|
||||||
|
/* check if typeclass+4 ttl + rdatalen is available */
|
||||||
|
if(sldns_buffer_remaining(pkt) < 4+4+2)
|
||||||
|
return RETVAL_TRUNC;
|
||||||
|
@@ -313,7 +320,8 @@ compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
if(owner_pos <= PTR_MAX_OFFSET)
|
||||||
|
*owner_ptr = htons(PTR_CREATE(owner_pos));
|
||||||
|
}
|
||||||
|
- if(!compress_tree_store(key->rk.dname, owner_labs,
|
||||||
|
+ if(*compress_count < MAX_COMPRESSION_PER_MESSAGE &&
|
||||||
|
+ !compress_tree_store(key->rk.dname, owner_labs,
|
||||||
|
owner_pos, region, p, insertpt))
|
||||||
|
return RETVAL_OUTMEM;
|
||||||
|
} else {
|
||||||
|
@@ -333,20 +341,24 @@ compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
|
||||||
|
/** compress any domain name to the packet, return RETVAL_* */
|
||||||
|
static int
|
||||||
|
-compress_any_dname(uint8_t* dname, sldns_buffer* pkt, int labs,
|
||||||
|
- struct regional* region, struct compress_tree_node** tree)
|
||||||
|
+compress_any_dname(uint8_t* dname, sldns_buffer* pkt, int labs,
|
||||||
|
+ struct regional* region, struct compress_tree_node** tree,
|
||||||
|
+ size_t* compress_count)
|
||||||
|
{
|
||||||
|
struct compress_tree_node* p;
|
||||||
|
struct compress_tree_node** insertpt = NULL;
|
||||||
|
size_t pos = sldns_buffer_position(pkt);
|
||||||
|
- if((p = compress_tree_lookup(tree, dname, labs, &insertpt))) {
|
||||||
|
+ if(*compress_count < MAX_COMPRESSION_PER_MESSAGE &&
|
||||||
|
+ (p = compress_tree_lookup(tree, dname, labs, &insertpt))) {
|
||||||
|
if(!write_compressed_dname(pkt, dname, labs, p))
|
||||||
|
return RETVAL_TRUNC;
|
||||||
|
+ (*compress_count)++;
|
||||||
|
} else {
|
||||||
|
if(!dname_buffer_write(pkt, dname))
|
||||||
|
return RETVAL_TRUNC;
|
||||||
|
}
|
||||||
|
- if(!compress_tree_store(dname, labs, pos, region, p, insertpt))
|
||||||
|
+ if(*compress_count < MAX_COMPRESSION_PER_MESSAGE &&
|
||||||
|
+ !compress_tree_store(dname, labs, pos, region, p, insertpt))
|
||||||
|
return RETVAL_OUTMEM;
|
||||||
|
return RETVAL_OK;
|
||||||
|
}
|
||||||
|
@@ -364,9 +376,9 @@ type_rdata_compressable(struct ub_packed_rrset_key* key)
|
||||||
|
|
||||||
|
/** compress domain names in rdata, return RETVAL_* */
|
||||||
|
static int
|
||||||
|
-compress_rdata(sldns_buffer* pkt, uint8_t* rdata, size_t todolen,
|
||||||
|
- struct regional* region, struct compress_tree_node** tree,
|
||||||
|
- const sldns_rr_descriptor* desc)
|
||||||
|
+compress_rdata(sldns_buffer* pkt, uint8_t* rdata, size_t todolen,
|
||||||
|
+ struct regional* region, struct compress_tree_node** tree,
|
||||||
|
+ const sldns_rr_descriptor* desc, size_t* compress_count)
|
||||||
|
{
|
||||||
|
int labs, r, rdf = 0;
|
||||||
|
size_t dname_len, len, pos = sldns_buffer_position(pkt);
|
||||||
|
@@ -380,8 +392,8 @@ compress_rdata(sldns_buffer* pkt, uint8_t* rdata, size_t todolen,
|
||||||
|
switch(desc->_wireformat[rdf]) {
|
||||||
|
case LDNS_RDF_TYPE_DNAME:
|
||||||
|
labs = dname_count_size_labels(rdata, &dname_len);
|
||||||
|
- if((r=compress_any_dname(rdata, pkt, labs, region,
|
||||||
|
- tree)) != RETVAL_OK)
|
||||||
|
+ if((r=compress_any_dname(rdata, pkt, labs, region,
|
||||||
|
+ tree, compress_count)) != RETVAL_OK)
|
||||||
|
return r;
|
||||||
|
rdata += dname_len;
|
||||||
|
todolen -= dname_len;
|
||||||
|
@@ -449,7 +461,8 @@ static int
|
||||||
|
packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
uint16_t* num_rrs, time_t timenow, struct regional* region,
|
||||||
|
int do_data, int do_sig, struct compress_tree_node** tree,
|
||||||
|
- sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset)
|
||||||
|
+ sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset,
|
||||||
|
+ size_t* compress_count)
|
||||||
|
{
|
||||||
|
size_t i, j, owner_pos;
|
||||||
|
int r, owner_labs;
|
||||||
|
@@ -477,9 +490,9 @@ packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
for(i=0; i<data->count; i++) {
|
||||||
|
/* rrset roundrobin */
|
||||||
|
j = (i + rr_offset) % data->count;
|
||||||
|
- if((r=compress_owner(key, pkt, region, tree,
|
||||||
|
- owner_pos, &owner_ptr, owner_labs))
|
||||||
|
- != RETVAL_OK)
|
||||||
|
+ if((r=compress_owner(key, pkt, region, tree,
|
||||||
|
+ owner_pos, &owner_ptr, owner_labs,
|
||||||
|
+ compress_count)) != RETVAL_OK)
|
||||||
|
return r;
|
||||||
|
sldns_buffer_write(pkt, &key->rk.type, 2);
|
||||||
|
sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
|
||||||
|
@@ -489,8 +502,8 @@ packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
else sldns_buffer_write_u32(pkt, data->rr_ttl[j]-adjust);
|
||||||
|
if(c) {
|
||||||
|
if((r=compress_rdata(pkt, data->rr_data[j],
|
||||||
|
- data->rr_len[j], region, tree, c))
|
||||||
|
- != RETVAL_OK)
|
||||||
|
+ data->rr_len[j], region, tree, c,
|
||||||
|
+ compress_count)) != RETVAL_OK)
|
||||||
|
return r;
|
||||||
|
} else {
|
||||||
|
if(sldns_buffer_remaining(pkt) < data->rr_len[j])
|
||||||
|
@@ -510,9 +523,9 @@ packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
|
||||||
|
return RETVAL_TRUNC;
|
||||||
|
sldns_buffer_write(pkt, &owner_ptr, 2);
|
||||||
|
} else {
|
||||||
|
- if((r=compress_any_dname(key->rk.dname,
|
||||||
|
- pkt, owner_labs, region, tree))
|
||||||
|
- != RETVAL_OK)
|
||||||
|
+ if((r=compress_any_dname(key->rk.dname,
|
||||||
|
+ pkt, owner_labs, region, tree,
|
||||||
|
+ compress_count)) != RETVAL_OK)
|
||||||
|
return r;
|
||||||
|
if(sldns_buffer_remaining(pkt) <
|
||||||
|
4+4+data->rr_len[i])
|
||||||
|
@@ -544,7 +557,8 @@ static int
|
||||||
|
insert_section(struct reply_info* rep, size_t num_rrsets, uint16_t* num_rrs,
|
||||||
|
sldns_buffer* pkt, size_t rrsets_before, time_t timenow,
|
||||||
|
struct regional* region, struct compress_tree_node** tree,
|
||||||
|
- sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset)
|
||||||
|
+ sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset,
|
||||||
|
+ size_t* compress_count)
|
||||||
|
{
|
||||||
|
int r;
|
||||||
|
size_t i, setstart;
|
||||||
|
@@ -560,7 +574,7 @@ insert_section(struct reply_info* rep, size_t num_rrsets, uint16_t* num_rrs,
|
||||||
|
setstart = sldns_buffer_position(pkt);
|
||||||
|
if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
|
||||||
|
pkt, num_rrs, timenow, region, 1, 1, tree,
|
||||||
|
- s, qtype, dnssec, rr_offset))
|
||||||
|
+ s, qtype, dnssec, rr_offset, compress_count))
|
||||||
|
!= RETVAL_OK) {
|
||||||
|
/* Bad, but if due to size must set TC bit */
|
||||||
|
/* trim off the rrset neatly. */
|
||||||
|
@@ -573,7 +587,7 @@ insert_section(struct reply_info* rep, size_t num_rrsets, uint16_t* num_rrs,
|
||||||
|
setstart = sldns_buffer_position(pkt);
|
||||||
|
if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
|
||||||
|
pkt, num_rrs, timenow, region, 1, 0, tree,
|
||||||
|
- s, qtype, dnssec, rr_offset))
|
||||||
|
+ s, qtype, dnssec, rr_offset, compress_count))
|
||||||
|
!= RETVAL_OK) {
|
||||||
|
sldns_buffer_set_position(pkt, setstart);
|
||||||
|
return r;
|
||||||
|
@@ -584,7 +598,7 @@ insert_section(struct reply_info* rep, size_t num_rrsets, uint16_t* num_rrs,
|
||||||
|
setstart = sldns_buffer_position(pkt);
|
||||||
|
if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
|
||||||
|
pkt, num_rrs, timenow, region, 0, 1, tree,
|
||||||
|
- s, qtype, dnssec, rr_offset))
|
||||||
|
+ s, qtype, dnssec, rr_offset, compress_count))
|
||||||
|
!= RETVAL_OK) {
|
||||||
|
sldns_buffer_set_position(pkt, setstart);
|
||||||
|
return r;
|
||||||
|
@@ -677,6 +691,7 @@ reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
|
||||||
|
struct compress_tree_node* tree = 0;
|
||||||
|
int r;
|
||||||
|
size_t rr_offset;
|
||||||
|
+ size_t compress_count=0;
|
||||||
|
|
||||||
|
sldns_buffer_clear(buffer);
|
||||||
|
if(udpsize < sldns_buffer_limit(buffer))
|
||||||
|
@@ -723,7 +738,7 @@ reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
|
||||||
|
arep.rrsets = &qinfo->local_alias->rrset;
|
||||||
|
if((r=insert_section(&arep, 1, &ancount, buffer, 0,
|
||||||
|
timezero, region, &tree, LDNS_SECTION_ANSWER,
|
||||||
|
- qinfo->qtype, dnssec, rr_offset)) != RETVAL_OK) {
|
||||||
|
+ qinfo->qtype, dnssec, rr_offset, &compress_count)) != RETVAL_OK) {
|
||||||
|
if(r == RETVAL_TRUNC) {
|
||||||
|
/* create truncated message */
|
||||||
|
sldns_buffer_write_u16_at(buffer, 6, ancount);
|
||||||
|
@@ -738,7 +753,7 @@ reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
|
||||||
|
/* insert answer section */
|
||||||
|
if((r=insert_section(rep, rep->an_numrrsets, &ancount, buffer,
|
||||||
|
0, timenow, region, &tree, LDNS_SECTION_ANSWER, qinfo->qtype,
|
||||||
|
- dnssec, rr_offset)) != RETVAL_OK) {
|
||||||
|
+ dnssec, rr_offset, &compress_count)) != RETVAL_OK) {
|
||||||
|
if(r == RETVAL_TRUNC) {
|
||||||
|
/* create truncated message */
|
||||||
|
sldns_buffer_write_u16_at(buffer, 6, ancount);
|
||||||
|
@@ -756,7 +771,7 @@ reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
|
||||||
|
if((r=insert_section(rep, rep->ns_numrrsets, &nscount, buffer,
|
||||||
|
rep->an_numrrsets, timenow, region, &tree,
|
||||||
|
LDNS_SECTION_AUTHORITY, qinfo->qtype,
|
||||||
|
- dnssec, rr_offset)) != RETVAL_OK) {
|
||||||
|
+ dnssec, rr_offset, &compress_count)) != RETVAL_OK) {
|
||||||
|
if(r == RETVAL_TRUNC) {
|
||||||
|
/* create truncated message */
|
||||||
|
sldns_buffer_write_u16_at(buffer, 8, nscount);
|
||||||
|
@@ -773,7 +788,7 @@ reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
|
||||||
|
if((r=insert_section(rep, rep->ar_numrrsets, &arcount, buffer,
|
||||||
|
rep->an_numrrsets + rep->ns_numrrsets, timenow, region,
|
||||||
|
&tree, LDNS_SECTION_ADDITIONAL, qinfo->qtype,
|
||||||
|
- dnssec, rr_offset)) != RETVAL_OK) {
|
||||||
|
+ dnssec, rr_offset, &compress_count)) != RETVAL_OK) {
|
||||||
|
if(r == RETVAL_TRUNC) {
|
||||||
|
/* no need to set TC bit, this is the additional */
|
||||||
|
sldns_buffer_write_u16_at(buffer, 10, arcount);
|
||||||
|
--
|
||||||
|
2.47.0
|
||||||
|
|
@ -30,7 +30,7 @@
|
|||||||
Summary: Validating, recursive, and caching DNS(SEC) resolver
|
Summary: Validating, recursive, and caching DNS(SEC) resolver
|
||||||
Name: unbound
|
Name: unbound
|
||||||
Version: 1.16.2
|
Version: 1.16.2
|
||||||
Release: 3%{?extra_version:.%{extra_version}}%{?dist}.5
|
Release: 8%{?extra_version:.%{extra_version}}%{?dist}.1
|
||||||
License: BSD
|
License: BSD
|
||||||
Url: https://nlnetlabs.nl/projects/unbound/
|
Url: https://nlnetlabs.nl/projects/unbound/
|
||||||
Source: https://nlnetlabs.nl/downloads/%{name}/%{name}-%{version}%{?extra_version}.tar.gz
|
Source: https://nlnetlabs.nl/downloads/%{name}/%{name}-%{version}%{?extra_version}.tar.gz
|
||||||
@ -57,7 +57,9 @@ Source21: remote-control.conf
|
|||||||
# https://github.com/NLnetLabs/unbound/commit/137719522a8ea5b380fbb6206d2466f402f5b554
|
# https://github.com/NLnetLabs/unbound/commit/137719522a8ea5b380fbb6206d2466f402f5b554
|
||||||
Patch1: unbound-1.16-CVE-2022-3204.patch
|
Patch1: unbound-1.16-CVE-2022-3204.patch
|
||||||
# https://nlnetlabs.nl/downloads/unbound/patch_CVE-2023-50387_CVE-2023-50868.diff
|
# https://nlnetlabs.nl/downloads/unbound/patch_CVE-2023-50387_CVE-2023-50868.diff
|
||||||
Patch2: unbound-1.16-CVE-2023-50387-CVE-2023-50868.patch
|
Patch4: unbound-1.16-CVE-2023-50387-CVE-2023-50868.patch
|
||||||
|
# https://github.com/NLnetLabs/unbound/commit/b7c61d7cc256d6a174e6179622c7fa968272c259
|
||||||
|
Patch3: unbound-1.21-CVE-2024-8508.patch
|
||||||
|
|
||||||
BuildRequires: gcc, make
|
BuildRequires: gcc, make
|
||||||
BuildRequires: flex, openssl-devel
|
BuildRequires: flex, openssl-devel
|
||||||
@ -453,23 +455,20 @@ popd
|
|||||||
%attr(0644,root,root) %config %{_sysconfdir}/%{name}/root.key
|
%attr(0644,root,root) %config %{_sysconfdir}/%{name}/root.key
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Wed Apr 03 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-3.5
|
* Tue Nov 12 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-8.1
|
||||||
- Rebuilt again with z-stream target
|
- Prevent unbounded name compression (CVE-2024-8508)
|
||||||
|
|
||||||
* Wed Apr 03 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-3.4
|
* Mon Mar 11 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-8
|
||||||
- Correct typo in new config file
|
|
||||||
|
|
||||||
* Mon Mar 11 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-3.3
|
|
||||||
- Ensure group access correction reaches also updated configs (CVE-2024-1488)
|
- Ensure group access correction reaches also updated configs (CVE-2024-1488)
|
||||||
|
|
||||||
* Wed Feb 28 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-3.2
|
* Wed Feb 28 2024 Petr Menšík <pemensik@redhat.com> - 1.16.2-7
|
||||||
- Ensure only unbound group can change configuration (CVE-2024-1488)
|
- Ensure only unbound group can change configuration (CVE-2024-1488)
|
||||||
|
|
||||||
* Wed Feb 14 2024 Tomas Korbar <tkorbar@redhat.com> - 1.16.2-3.1
|
* Fri Feb 16 2024 Tomas Korbar <tkorbar@redhat.com> - 1.16.2-6
|
||||||
- Fix KeyTrap - Extreme CPU consumption in DNSSEC validator CVE-2023-50387
|
- Fix KeyTrap - Extreme CPU consumption in DNSSEC validator CVE-2023-50387
|
||||||
- Fix Preparing an NSEC3 closest encloser proof can exhaust CPU resources CVE-2023-50868
|
- Fix Preparing an NSEC3 closest encloser proof can exhaust CPU resources CVE-2023-50868
|
||||||
- Resolves: RHEL-25642
|
- Resolves: RHEL-25671
|
||||||
- Resolves: RHEL-25670
|
- Resolves: RHEL-25643
|
||||||
|
|
||||||
* Tue Oct 11 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-3
|
* Tue Oct 11 2022 Petr Menšík <pemensik@redhat.com> - 1.16.2-3
|
||||||
- Fix NRDelegation attack leading to uncontrolled resource consumption
|
- Fix NRDelegation attack leading to uncontrolled resource consumption
|
||||||
|
Loading…
Reference in New Issue
Block a user