Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-12064

Опубликовано: 29 июл. 2025
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2025-12064: unbound security update (IMPORTANT)

[1.20.0-12]

  • Fix CVE-2025-5994

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

python3-unbound

1.20.0-12.el10_0

unbound

1.20.0-12.el10_0

unbound-anchor

1.20.0-12.el10_0

unbound-dracut

1.20.0-12.el10_0

unbound-libs

1.20.0-12.el10_0

unbound-devel

1.20.0-12.el10_0

Oracle Linux x86_64

python3-unbound

1.20.0-12.el10_0

unbound

1.20.0-12.el10_0

unbound-anchor

1.20.0-12.el10_0

unbound-dracut

1.20.0-12.el10_0

unbound-libs

1.20.0-12.el10_0

unbound-devel

1.20.0-12.el10_0

Связанные CVE

Связанные уязвимости

ubuntu
21 день назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.

CVSS3: 7.5
redhat
22 дня назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.

nvd
21 день назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.

debian
21 день назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' ...

github
21 день назад

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.