[unbound] version bump 1.9.5 (fix for vulnerability CVE-2019-16866)
Unbound 1.9.5 is available:
This release is a fix for vulnerability CVE-2019-18934, that can cause shell execution in ipsecmod.
- Fix for the reported vulnerability.
The CVE number for this vulnerability is CVE-2019-18934
Recent versions of Unbound contain a vulnerability that can cause shell
code execution after receiving a specially crafted answer. This issue
can only be triggered if unbound was compiled with
support, and ipsecmod is enabled and used in the configuration.
== Affected products Unbound 1.6.4 up to and including 1.9.4.
== Description Due to unsanitized characters passed to the ipsecmod-hook shell command, it is possible for Unbound to allow shell code execution from a specially crafted IPSECKEY answer.
This issue can only be triggered when all of the below conditions are met:
- unbound was compiled with
- ipsecmod is enabled and used in the configuration, and
- a domain is part of the ipsecmod-whitelist (if ipsecmod-whitelist is used), and
- unbound receives an A/AAAA query for a domain that has an A/AAAA record(s) and an IPSECKEY record(s) available.
The shell code execution can then happen if either the qname or the gateway field of the IPSECKEY (when gateway type == 3) contain a specially crafted domain name.
== Solution Download patched version of Unbound, or apply the patch manually.
Downloading patched version Unbound 1.9.5 is released with the patch https://nlnetlabs.nl/downloads/unbound/unbound-1.9.5.tar.gz
Applying the Patch manually For Unbound 1.6.4 up to and including 1.9.4 the patch is: https://nlnetlabs.nl/downloads/unbound/patch_cve_2019-18934.diff
Apply the patch on the Unbound source directory with: 'patch -p1 < patch_cve_2019-18934.diff' then run 'make install' to install Unbound.