Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2026:20619-1

Опубликовано: 23 апр. 2026
Источник: suse-cvrf

Описание

Security update for coredns

This update for coredns fixes the following issues:

Changes in coredns:

  • Update to version 1.14.2:

    • plugin/reload: Allow disabling jitter with 0s
    • bump deps
    • plugin/forward: fix parsing error when handling TLS+IPv6 address
    • plugin/loop: use crypto/rand for query name generation
    • plugin: reorder rewrite before acl to prevent bypass
    • fix(rewrite): fix cname target rewrite for CNAME chains
    • fix(kubernetes): panic on empty ListenHosts
    • chore: bump minimum Go version to 1.25
    • feat(proxyproto): add proxy protocol support
    • refactor(cache): modernize with generics
    • Add metadata for response Type and Class to Log
    • docs: clarify kubernetes auth docs
    • fix: return SOA and NS records when queried for a record CNAMEd to origin
  • fixes bsc#1259320 CVE-2026-26017

  • fixes bsc#1259319 CVE-2026-26018

  • address more unstable unstable tests under aarch64 and s390x

  • Update to version 1.14.1:

    • This release primarily addresses security vulnerabilities affecting Go versions prior to Go 1.25.6 and Go 1.24.12 (CVE-2025-61728, CVE-2025-61726, CVE-2025-68121, CVE-2025-61731, CVE-2025-68119). It also includes performance improvements to the proxy plugin via multiplexed connections, along with various documentation updates.

Список пакетов

openSUSE Leap 16.0
coredns-1.14.2-bp160.1.1
coredns-extras-1.14.2-bp160.1.1

Описание

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки

Описание

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2.


Затронутые продукты
openSUSE Leap 16.0:coredns-1.14.2-bp160.1.1
openSUSE Leap 16.0:coredns-extras-1.14.2-bp160.1.1

Ссылки