USN-6998-1: Unbound vulnerabilities
11 September 2024
Several security issues were fixed in Unbound.
Releases
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 ESM
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Packages
- unbound - validating, recursive, caching DNS resolver
Details
It was discovered that Unbound incorrectly handled string comparisons,
which could lead to a NULL pointer dereference. An attacker could
potentially use this issue to cause a denial of service. (CVE-2024-43167)
It was discovered that Unbound incorrectly handled memory in
cfg_mark_ports, which could lead to a heap buffer overflow. A local
attacker could potentially use this issue to cause a denial of service
or execute arbitrary code. (CVE-2024-43168)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
libunbound2
-
1.6.7-1ubuntu2.6+esm2
Available with Ubuntu Pro
-
unbound
-
1.6.7-1ubuntu2.6+esm2
Available with Ubuntu Pro
-
unbound-host
-
1.6.7-1ubuntu2.6+esm2
Available with Ubuntu Pro
Ubuntu 16.04
-
libunbound2
-
1.5.8-1ubuntu1.1+esm1
Available with Ubuntu Pro
-
unbound
-
1.5.8-1ubuntu1.1+esm1
Available with Ubuntu Pro
-
unbound-host
-
1.5.8-1ubuntu1.1+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
libunbound2
-
1.4.22-1ubuntu4.14.04.3+esm1
Available with Ubuntu Pro
-
unbound
-
1.4.22-1ubuntu4.14.04.3+esm1
Available with Ubuntu Pro
-
unbound-host
-
1.4.22-1ubuntu4.14.04.3+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.