UbuntuUpdates.org

Package "unbound"

Name: unbound

Description:

validating, recursive, caching DNS resolver

Latest version: 1.9.4-2ubuntu1.8
Release: focal (20.04)
Level: security
Repository: universe
Homepage: https://www.unbound.net/

Links


Download "unbound"


Other versions of "unbound" in Focal

Repository Area Version
base main 1.9.4-2ubuntu1
base universe 1.9.4-2ubuntu1
security main 1.9.4-2ubuntu1.8
updates main 1.9.4-2ubuntu1.8
updates universe 1.9.4-2ubuntu1.8

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.9.4-2ubuntu1.8 2024-09-11 08:06:53 UTC

  unbound (1.9.4-2ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2024-43167-1.patch: fix null pointer
      dereference issue in function ub_ctx_set_fwd of file
      libunbound/libunbound.c
    - debian/patches/CVE-2024-43167-2.patch: fix to print a parse
      error when config is read with no name for a forward-zone, stub-
      zone or view.
    - CVE-2024-43167
  * SECURITY UPDATE: heap buffer overflow
    - debian/patches/CVE-2024-43168-1.patch: fix heap-buffer-overflow
      issue in function cfg_mark_ports of file util/config_file.c
    - debian/patches/CVE-2024-43168-2.patch: adjust error text and
      disallow negative ports in other parts of cfg_mark_ports.
    - CVE-2024-43168

 -- Bruce Cable <email address hidden> Thu, 05 Sep 2024 16:30:26 +1000

Source diff to previous version
CVE-2024-43167 A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific seque
CVE-2024-43168 A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue

Version: 1.9.4-2ubuntu1.6 2024-05-28 14:07:08 UTC

  unbound (1.9.4-2ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: Unbound could be used to take part in a DoS attack
    - debian/patches/CVE-2024-33655.patch: fix for the DNSBomb
      vulnerability in doc/example.conf.in, doc/unbound.conf.5.in,
      services/cache/infra.c, services/cache/infra.h, services/mesh.c,
      testdata/*, util/config_file.c, util/config_file.h,
      util/configlexer.lex, util/configparser.y.
    - CVE-2024-33655

 -- Marc Deslauriers <email address hidden> Wed, 15 May 2024 15:09:15 +0200

Source diff to previous version

Version: 1.9.4-2ubuntu1.5 2024-02-28 15:07:01 UTC

  unbound (1.9.4-2ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Denial of service issues via DNSSEC responses
    - debian/patches/CVE-2023-50387-and-CVE-2023-50868.patch:
      patch obtained from Debian's 1.9.0-2+deb10u4 package, thanks to
      Markus Koschany.
    - CVE-2023-50387
    - CVE-2023-50868

 -- Marc Deslauriers <email address hidden> Tue, 27 Feb 2024 16:55:01 -0500

Source diff to previous version
CVE-2023-50387 Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU
CVE-2023-50868 The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of se

Version: 1.9.4-2ubuntu1.4 2022-11-17 20:06:33 UTC

  unbound (1.9.4-2ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: Non-Responsive Delegation Attack
    - debian/patches/CVE-2022-3204.patch: limit number of lookups in
      iterator/iter_delegpt.*, iterator/iter_utils.*, iterator/iterator.c,
      services/cache/dns.c, services/mesh.*.
    - CVE-2022-3204

 -- Marc Deslauriers <email address hidden> Tue, 15 Nov 2022 15:05:15 -0500

Source diff to previous version
CVE-2022-3204 A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegatio

Version: 1.9.4-2ubuntu1.3 2022-08-16 15:06:21 UTC

  unbound (1.9.4-2ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: Ghost domain names issues
    - debian/patches/CVE-2022-3069x-pre1.patch: fix that nxdomain synthesis
      does not happen above the stub or forward definition in
      cachedb/cachedb.c, edns-subnet/subnetmod.c, iterator/iter_utils.c,
      iterator/iter_utils.h, iterator/iterator.c, services/cache/dns.c,
      services/cache/dns.h.
    - debian/patches/CVE-2022-3069x.patch: fix the novel ghost domain
      issues in cachedb/cachedb.c, daemon/cachedump.c, daemon/worker.c,
      dns64/dns64.c, ipsecmod/ipsecmod.c, iterator/iter_utils.c,
      iterator/iter_utils.h, iterator/iterator.c, pythonmod/interface.i,
      pythonmod/pythonmod_utils.c, services/cache/dns.c,
      services/cache/dns.h, services/mesh.c,
      testdata/iter_prefetch_change.rpl, util/module.h,
      validator/validator.c.
    - CVE-2022-30698
    - CVE-2022-30699

 -- Marc Deslauriers <email address hidden> Tue, 02 Aug 2022 09:55:28 -0400

CVE-2022-30698 NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by t
CVE-2022-30699 NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by



About   -   Send Feedback to @ubuntu_updates