<div class="container">
    <h1>Security update for unbound</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:20126-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-02-13T12:29:03Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>moderate</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231284">bsc#1231284</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-8508.html">CVE-2024-8508</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8508</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.9</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8508</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8508</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8508</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Micro 6.0</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves one vulnerability can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for unbound fixes the following issues:</p>
<ul>
<li>Update to 1.22.0:
  Features:</li>
<li>Add iter-scrub-ns, iter-scrub-cname and max-global-quota
    configuration options.</li>
<li>Merge patch to fix for glue that is outside of zone, with
    <code>harden-unverified-glue</code>, from Karthik Umashankar (Microsoft).
    Enabling this option protects the Unbound resolver against bad
    glue, that is unverified out of zone glue, by resolving them.
    It uses the records as last resort if there is no other working
    glue.</li>
<li>Add redis-command-timeout: 20 and redis-connect-timeout: 200,
    that can set the timeout separately for commands and the
    connection set up to the redis server. If they are not
    specified, the redis-timeout value is used.</li>
<li>Log timestamps in ISO8601 format with timezone. This adds the
    option <code>log-time-iso: yes</code> that logs in ISO8601 format.</li>
<li>DNS over QUIC. This adds <code>quic-port: 853</code> and <code>quic-size: 8m</code>
    that enable dnsoverquic, and the counters <code>num.query.quic</code> and
    <code>mem.quic</code> in the statistics output. The feature needs to be
    enabled by compiling with libngtcp2, with
    <code>--with-libngtcp2=path</code> and libngtcp2 needs openssl+quic, pass
    that with <code>--with-ssl=path</code> to compile unbound as well.</li>
</ul>
<p>Bug Fixes:
  * unbound-control-setup hangs while testing for openssl presence
    starting from version 1.21.0.
  * Fix error: "memory exhausted" when defining more than 9994
    local-zones.
  * Fix documentation for cache_fill_missing function.
  * Fix Loads of logs: "validation failure: key for validation
    <domain>. is marked as invalid because of a previous" for
    non-DNSSEC signed zone.
  * Fix that when rpz is applied the message does not get picked up
    by the validator. That stops validation failures for the
    message.
  * Fix that stub-zone and forward-zone clauses do not exhaust
    memory for long content.
  * Fix to print port number in logs for auth zone transfer
    activities.
  * b.root renumbering.
  * Add new IANA trust anchor.
  * Fix config file read for dnstap-sample-rate.
  * Fix alloc-size and calloc-transposed-args compiler warnings.
  * Fix to limit NSEC and NSEC3 TTL when aggressive nsec is enabled
    (RFC9077).
  * Fix dns64 with prefetch that the prefetch is stored in cache.
  * Attempt to further fix doh_downstream_buffer_size.tdir
    flakiness.
  * More clear text for prefetch and minimal-responses in the
    unbound.conf man page.
  * Fix cache update when serve expired is used. Expired records
    are favored over resolution and validation failures when
    serve-expired is used.
  * Fix negative cache NSEC3 parameter compares for zero length
    NSEC3 salt.
  * Fix unbound-control-setup hangs sometimes depending on the
    openssl version.
  * Fix Cannot override tcp-upstream and tls-upstream with
    forward-tcp-upstream and forward-tls-upstream.
  * Fix to limit NSEC TTL for messages from cachedb. Fix to limit
    the prefetch ttl for messages after a CNAME with short TTL.
  * Fix to disable detection of quic configured ports when quic is
    not compiled in.
  * Fix harden-unverified-glue for AAAA cache_fill_missing lookups.
  * Fix contrib/aaaa-filter-iterator for change in call
    signature for cache_fill_missing.
  * Fix to display warning if quic-port is set but dnsoverquic is
    not enabled when compiled.
  * Fix dnsoverquic to extend the number of streams when one is
    closed.
  * Fix for dnstap with dnscrypt and dnstap without dnsoverquic.
  * Fix for dnsoverquic and dnstap to use the correct dnstap
    environment.</p>
<ul>
<li>Update to 1.21.1:
  Security Fixes:</li>
<li>CVE-2024-8508: unbounded name compression could lead to
    denial of service. (bsc#1231284)</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Micro 6.0
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-6.0-213=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>libunbound8-1.22.0-1.1</li>
                        
                            <li>unbound-anchor-debuginfo-1.22.0-1.1</li>
                        
                            <li>libunbound8-debuginfo-1.22.0-1.1</li>
                        
                            <li>unbound-debugsource-1.22.0-1.1</li>
                        
                            <li>unbound-anchor-1.22.0-1.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-8508.html">https://www.suse.com/security/cve/CVE-2024-8508.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231284">https://bugzilla.suse.com/show_bug.cgi?id=1231284</a>
                    </li>
                
            
        </ul>
    
</div>