<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0143</id>
    <title>An update for unbound is now available for HCE 3.0</title>
    <severity>Important</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:18"/>
    <updated date="2025-10-09 06:38:18"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698" id="CVE-2022-30698" title="CVE-2022-30698 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-43168" id="CVE-2024-43168" title="CVE-2024-43168 Base Score: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508" id="CVE-2024-8508" title="CVE-2024-8508 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-43167" id="CVE-2024-43167" title="CVE-2024-43167 Base Score: 2.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994" id="CVE-2025-5994" title="CVE-2025-5994 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the &quot;ghost domain names&quot; attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound_x27;s delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information. (CVE-2022-30698)

DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound_x27;s config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system. (CVE-2024-43168)

NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic. (CVE-2024-8508)

A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly. (CVE-2024-43167)

A multi-vendor cache poisoning vulnerability named _x27;Rebirthday Attack_x27; has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., _x27;--enable-subnet_x27;, AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the _x27;send-client-subnet_x27;, _x27;client-subnet-zone_x27; or _x27;client-subnet-always-forward_x27; options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies. (CVE-2025-5994)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="unbound">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="python3-unbound" version="1.17.1" release="10.r3.hce3">
          <filename>python3-unbound-1.17.1-10.r3.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="unbound-libs" version="1.17.1" release="10.r3.hce3">
          <filename>unbound-libs-1.17.1-10.r3.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="python3-unbound" version="1.17.1" release="10.r3.hce3">
          <filename>python3-unbound-1.17.1-10.r3.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="unbound-libs" version="1.17.1" release="10.r3.hce3">
          <filename>unbound-libs-1.17.1-10.r3.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
