CVE-2024-43167

NameCVE-2024-43167
DescriptionA NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1078647

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
unbound (PTS)jessie, jessie (lts)1.4.22-3+deb8u4vulnerable
stretch1.6.0-3+deb9u2vulnerable
buster (security), buster, buster (lts)1.9.0-2+deb10u4vulnerable
bullseye (security), bullseye1.13.1-1+deb11u2vulnerable
bookworm (security), bookworm1.17.1-2+deb12u2vulnerable
sid, trixie1.20.0-1vulnerable
unbound1.9 (PTS)stretch (security)1.9.0-2+deb10u2~deb9u2vulnerable
stretch (lts), stretch1.9.0-2+deb10u2~deb9u4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
unboundsourcejessie(unfixed)end-of-life
unboundsourcestretch(unfixed)end-of-life
unboundsource(unstable)(unfixed)1078647
unbound1.9source(unstable)(unfixed)

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=2303456
https://github.com/NLnetLabs/unbound/issues/1072
https://github.com/NLnetLabs/unbound/pull/1073
Fixed by: https://github.com/NLnetLabs/unbound/commit/8e43e2574c4e02f79c562a061581cdcefe136912 (release-1.21.0rc1)

Search for package or bug name: Reporting problems