Name | CVE-2024-43167 |
Description | A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1078647 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
unbound (PTS) | jessie, jessie (lts) | 1.4.22-3+deb8u4 | vulnerable |
stretch | 1.6.0-3+deb9u2 | vulnerable | |
buster (security), buster, buster (lts) | 1.9.0-2+deb10u4 | vulnerable | |
bullseye (security), bullseye | 1.13.1-1+deb11u2 | vulnerable | |
bookworm (security), bookworm | 1.17.1-2+deb12u2 | vulnerable | |
sid, trixie | 1.20.0-1 | vulnerable | |
unbound1.9 (PTS) | stretch (security) | 1.9.0-2+deb10u2~deb9u2 | vulnerable |
stretch (lts), stretch | 1.9.0-2+deb10u2~deb9u4 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
unbound | source | jessie | (unfixed) | end-of-life | ||
unbound | source | stretch | (unfixed) | end-of-life | ||
unbound | source | (unstable) | (unfixed) | 1078647 | ||
unbound1.9 | source | (unstable) | (unfixed) |
https://bugzilla.redhat.com/show_bug.cgi?id=2303456
https://github.com/NLnetLabs/unbound/issues/1072
https://github.com/NLnetLabs/unbound/pull/1073
Fixed by: https://github.com/NLnetLabs/unbound/commit/8e43e2574c4e02f79c562a061581cdcefe136912 (release-1.21.0rc1)