Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-2455

Опубликовано: 23 нояб. 2015
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2015-2455: unbound security and bug fix update (LOW)

[1.4.20-26]

  • Added Conficts on redhat-release packages without unbound-anchor.timer in presets (Related #1215645)

[1.4.20-25]

  • Resolve ordering loop with nss-lookup.target and ntpdate (#1259806)

[1.4.20-24]

  • Fix CVE-2014-8602 (#1253961)

[1.4.20-23]

  • Removed usage of DLV from the default configuration (#1223339)

[1.4.20-22]

  • unbound.service now Wants unbound-anchor.timer (Related: #1180267)

[1.4.20-21]

  • Fix dependencies and minor scriptlet issues due to systemd timer unit (Related: #1180267)

[1.4.20-20]

  • Install tmpfiles configuration into /usr/lib/tmpfiles.d (#1180995)
  • Fix root key management to comply to RFC5011 (#1180267)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

unbound

1.4.20-26.el7

unbound-devel

1.4.20-26.el7

unbound-libs

1.4.20-26.el7

unbound-python

1.4.20-26.el7

Связанные CVE

Связанные уязвимости

ubuntu
больше 10 лет назад

iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.

redhat
больше 10 лет назад

iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.

nvd
больше 10 лет назад

iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.

debian
больше 10 лет назад

iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegatio ...

github
больше 3 лет назад

iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.