{"affected":[{"ecosystem_specific":{"binaries":[{"libunbound8":"1.22.0-1.1","unbound-anchor":"1.22.0-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"unbound","purl":"pkg:rpm/suse/unbound&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.22.0-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for unbound fixes the following issues:\n\n- Update to 1.22.0:\n  Features:\n  * Add iter-scrub-ns, iter-scrub-cname and max-global-quota\n    configuration options.\n  * Merge patch to fix for glue that is outside of zone, with\n    `harden-unverified-glue`, from Karthik Umashankar (Microsoft).\n    Enabling this option protects the Unbound resolver against bad\n    glue, that is unverified out of zone glue, by resolving them.\n    It uses the records as last resort if there is no other working\n    glue.\n  * Add redis-command-timeout: 20 and redis-connect-timeout: 200,\n    that can set the timeout separately for commands and the\n    connection set up to the redis server. If they are not\n    specified, the redis-timeout value is used.\n  * Log timestamps in ISO8601 format with timezone. This adds the\n    option `log-time-iso: yes` that logs in ISO8601 format.\n  * DNS over QUIC. This adds `quic-port: 853` and `quic-size: 8m`\n    that enable dnsoverquic, and the counters `num.query.quic` and\n    `mem.quic` in the statistics output. The feature needs to be\n    enabled by compiling with libngtcp2, with\n    `--with-libngtcp2=path` and libngtcp2 needs openssl+quic, pass\n    that with `--with-ssl=path` to compile unbound as well.\n\n  Bug Fixes:\n  * unbound-control-setup hangs while testing for openssl presence\n    starting from version 1.21.0.\n  * Fix error: \"memory exhausted\" when defining more than 9994\n    local-zones.\n  * Fix documentation for cache_fill_missing function.\n  * Fix Loads of logs: \"validation failure: key for validation\n    <domain>. is marked as invalid because of a previous\" for\n    non-DNSSEC signed zone.\n  * Fix that when rpz is applied the message does not get picked up\n    by the validator. That stops validation failures for the\n    message.\n  * Fix that stub-zone and forward-zone clauses do not exhaust\n    memory for long content.\n  * Fix to print port number in logs for auth zone transfer\n    activities.\n  * b.root renumbering.\n  * Add new IANA trust anchor.\n  * Fix config file read for dnstap-sample-rate.\n  * Fix alloc-size and calloc-transposed-args compiler warnings.\n  * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled\n    (RFC9077).\n  * Fix dns64 with prefetch that the prefetch is stored in cache.\n  * Attempt to further fix doh_downstream_buffer_size.tdir\n    flakiness.\n  * More clear text for prefetch and minimal-responses in the\n    unbound.conf man page.\n  * Fix cache update when serve expired is used. Expired records\n    are favored over resolution and validation failures when\n    serve-expired is used.\n  * Fix negative cache NSEC3 parameter compares for zero length\n    NSEC3 salt.\n  * Fix unbound-control-setup hangs sometimes depending on the\n    openssl version.\n  * Fix Cannot override tcp-upstream and tls-upstream with\n    forward-tcp-upstream and forward-tls-upstream.\n  * Fix to limit NSEC TTL for messages from cachedb. Fix to limit\n    the prefetch ttl for messages after a CNAME with short TTL.\n  * Fix to disable detection of quic configured ports when quic is\n    not compiled in.\n  * Fix harden-unverified-glue for AAAA cache_fill_missing lookups.\n  * Fix contrib/aaaa-filter-iterator for change in call\n    signature for cache_fill_missing.\n  * Fix to display warning if quic-port is set but dnsoverquic is\n    not enabled when compiled.\n  * Fix dnsoverquic to extend the number of streams when one is\n    closed.\n  * Fix for dnstap with dnscrypt and dnstap without dnsoverquic.\n  * Fix for dnsoverquic and dnstap to use the correct dnstap\n    environment.\n\n- Update to 1.21.1:\n  Security Fixes:\n  * CVE-2024-8508: unbounded name compression could lead to\n    denial of service. (bsc#1231284)\n","id":"SUSE-SU-2025:20126-1","modified":"2025-02-13T12:16:23Z","published":"2025-02-13T12:16:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520126-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8508"}],"related":["CVE-2024-8508"],"summary":"Security update for unbound","upstream":["CVE-2024-8508"]}