[USN-6998-1] Unbound vulnerabilities

Bruce Cable bruce.cable at canonical.com
Wed Sep 11 07:31:29 UTC 2024


==========================================================================
Ubuntu Security Notice USN-6998-1
September 11, 2024

unbound vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Unbound.

Software Description:
- unbound: validating, recursive, caching DNS resolver

Details:

It was discovered that Unbound incorrectly handled string comparisons,
which could lead to a NULL pointer dereference. An attacker could
potentially use this issue to cause a denial of service. (CVE-2024-43167)

It was discovered that Unbound incorrectly handled memory in
cfg_mark_ports, which could lead to a heap buffer overflow. A local
attacker could potentially use this issue to cause a denial of service
or execute arbitrary code. (CVE-2024-43168)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
   libunbound8                     1.19.2-1ubuntu3.2
   unbound                         1.19.2-1ubuntu3.2
   unbound-host                    1.19.2-1ubuntu3.2

Ubuntu 22.04 LTS
   libunbound8                     1.13.1-1ubuntu5.7
   unbound                         1.13.1-1ubuntu5.7
   unbound-host                    1.13.1-1ubuntu5.7

Ubuntu 20.04 LTS
   libunbound8                     1.9.4-2ubuntu1.8
   unbound                         1.9.4-2ubuntu1.8
   unbound-host                    1.9.4-2ubuntu1.8

Ubuntu 18.04 LTS
   libunbound2                     1.6.7-1ubuntu2.6+esm2
                                   Available with Ubuntu Pro
   unbound                         1.6.7-1ubuntu2.6+esm2
                                   Available with Ubuntu Pro
   unbound-host                    1.6.7-1ubuntu2.6+esm2
                                   Available with Ubuntu Pro

Ubuntu 16.04 LTS
   libunbound2                     1.5.8-1ubuntu1.1+esm1
                                   Available with Ubuntu Pro
   unbound                         1.5.8-1ubuntu1.1+esm1
                                   Available with Ubuntu Pro
   unbound-host                    1.5.8-1ubuntu1.1+esm1
                                   Available with Ubuntu Pro

Ubuntu 14.04 LTS
   libunbound2                     1.4.22-1ubuntu4.14.04.3+esm1
                                   Available with Ubuntu Pro
   unbound                         1.4.22-1ubuntu4.14.04.3+esm1
                                   Available with Ubuntu Pro
   unbound-host                    1.4.22-1ubuntu4.14.04.3+esm1
                                   Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-6998-1
   CVE-2024-43167, CVE-2024-43168

Package Information:
   https://launchpad.net/ubuntu/+source/unbound/1.19.2-1ubuntu3.2
   https://launchpad.net/ubuntu/+source/unbound/1.13.1-1ubuntu5.7
   https://launchpad.net/ubuntu/+source/unbound/1.9.4-2ubuntu1.8

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240911/14e220ca/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240911/14e220ca/attachment.sig>


More information about the ubuntu-security-announce mailing list