VYPR

rpm package

suse/unbound&distro=SUSE Linux Enterprise High Performance Computing 15-ESPOS

pkg:rpm/suse/unbound&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS

Vulnerabilities (16)

  • CVE-2019-25031Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session. NOTE: The vendor does not consider this a vulnerability of the Unbound software. create_unbound_ad_servers.sh is a cont

  • CVE-2019-25032Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25033Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25034Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploit

  • CVE-2019-25035Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25036Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25037Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25038Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25039Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25040Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25041Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2019-25042Apr 27, 2021
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

  • CVE-2020-28935Dec 7, 2020
    affected < 1.6.8-3.9.1fixed 1.6.8-3.9.1

    NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an exis

  • CVE-2020-12662May 19, 2020
    affected < 1.6.8-3.6.1fixed 1.6.8-3.6.1

    Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

  • CVE-2020-12663May 19, 2020
    affected < 1.6.8-3.6.1fixed 1.6.8-3.6.1

    Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.

  • CVE-2019-18934Nov 19, 2019
    affected < 1.6.8-3.6.1fixed 1.6.8-3.6.1

    Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in t