UbuntuUpdates.org

Package "unbound"

Name: unbound

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • static library, header files, and docs for libunbound
  • library implementing DNS resolution and validation

Latest version: 1.19.2-1ubuntu3.2
Release: noble (24.04)
Level: security
Repository: main

Links



Other versions of "unbound" in Noble

Repository Area Version
base universe 1.19.2-1ubuntu3
base main 1.19.2-1ubuntu3
security universe 1.19.2-1ubuntu3.2
updates main 1.19.2-1ubuntu3.2
updates universe 1.19.2-1ubuntu3.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.19.2-1ubuntu3.2 2024-09-11 08:06:55 UTC

  unbound (1.19.2-1ubuntu3.2) noble-security; urgency=medium

  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2024-43167-1.patch: fix null pointer
      dereference issue in function ub_ctx_set_fwd of file
      libunbound/libunbound.c
    - debian/patches/CVE-2024-43167-2.patch: fix to print a parse
      error when config is read with no name for a forward-zone, stub-
      zone or view.
    - CVE-2024-43167
  * SECURITY UPDATE: heap buffer overflow
    - debian/patches/CVE-2024-43168-1.patch: fix heap-buffer-overflow
      issue in function cfg_mark_ports of file util/config_file.c
    - debian/patches/CVE-2024-43168-2.patch: adjust error text and
      disallow negative ports in other parts of cfg_mark_ports.
    - CVE-2024-43168

 -- Bruce Cable <email address hidden> Thu, 05 Sep 2024 17:51:24 +1000

Source diff to previous version
CVE-2024-43167 A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific seque
CVE-2024-43168 A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue

Version: 1.19.2-1ubuntu3.1 2024-05-28 14:07:19 UTC

  unbound (1.19.2-1ubuntu3.1) noble-security; urgency=medium

  * SECURITY UPDATE: Unbound could be used to take part in a DoS attack
    - debian/patches/CVE-2024-33655.patch: fix for the DNSBomb
      vulnerability in doc/example.conf.in, doc/unbound.conf.5.in,
      services/cache/infra.c, services/cache/infra.h, services/mesh.c,
      testdata/*, util/config_file.c, util/config_file.h,
      util/configlexer.lex, util/configparser.y.
    - CVE-2024-33655

 -- Marc Deslauriers <email address hidden> Wed, 15 May 2024 12:01:37 +0200




About   -   Send Feedback to @ubuntu_updates