2.8 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
Unbound: null pointer dereference in unbound
A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.
References
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- https://access.redhat.com/security/cve/CVE-2024-43167 x_refsource_REDHAT vdb-entry
- RHBZ#2303456 issue-tracking x_refsource_REDHAT
- https://github.com/NLnetLabs/unbound/issues/1072
- https://github.com/NLnetLabs/unbound/pull/1073/files
- http://www.openwall.com/lists/oss-security/2024/08/16/6
- https://lists.debian.org/debian-lts-announce/2024/09/msg00046.html
Affected products
Matching in nixpkgs
pkgs.unbound
Validating, recursive, and caching DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 1.23.1
pkgs.unbound-full
Validating, recursive, and caching DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 1.23.1
pkgs.unbound-with-systemd
Validating, recursive, and caching DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 1.23.1
pkgs.luaPackages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.lua51Packages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.lua52Packages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.lua53Packages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.lua54Packages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.luajitPackages.luaunbound
A binding to libunbound
-
nixos-unstable -
- nixpkgs-unstable 1.0.0-1
pkgs.prometheus-unbound-exporter
Prometheus exporter for Unbound DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 0.4.6
pkgs.python312Packages.pyunbound
Python library for Unbound, the validating, recursive, and caching DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 1.23.1
pkgs.python313Packages.pyunbound
Python library for Unbound, the validating, recursive, and caching DNS resolver
-
nixos-unstable -
- nixpkgs-unstable 1.23.1
pkgs.haskellPackages.unbound-generics
Support for programming with names and binders using GHC Generics
-
nixos-unstable -
- nixpkgs-unstable 0.4.4
pkgs.haskellPackages.unbounded-delays
Unbounded thread delays and timeouts
-
nixos-unstable -
- nixpkgs-unstable 0.1.1.1
pkgs.haskellPackages.unbound-kind-generics
Support for programming with names and binders using kind-generics
-
nixos-unstable -
- nixpkgs-unstable 0.2.1.1
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@leenaars Michiel Leenaars <ml.software@leenaa.rs>
-
@Scrumplex Sefa Eyeoglu <contact@scrumplex.net>