USN-7080-1: Unbound vulnerability

Publication date

22 October 2024

Overview

Unbound could be made to stop responding if it received specially crafted DNS traffic.


Packages

  • unbound - validating, recursive, caching DNS resolver

Details

Toshifumi Sakaguchi discovered that Unbound incorrectly handled name
compression for large RRsets, which could lead to excessive CPU usage.
An attacker could potentially use this issue to cause a denial of service
by sending specially crafted DNS responses.

Toshifumi Sakaguchi discovered that Unbound incorrectly handled name
compression for large RRsets, which could lead to excessive CPU usage.
An attacker could potentially use this issue to cause a denial of service
by sending specially crafted DNS responses.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.10 oracular libunbound8 –  1.20.0-1ubuntu2.1
unbound –  1.20.0-1ubuntu2.1
24.04 noble libunbound8 –  1.19.2-1ubuntu3.3
unbound –  1.19.2-1ubuntu3.3
22.04 jammy libunbound8 –  1.13.1-1ubuntu5.8
unbound –  1.13.1-1ubuntu5.8
20.04 focal libunbound8 –  1.9.4-2ubuntu1.9
unbound –  1.9.4-2ubuntu1.9
18.04 bionic libunbound2 –  1.6.7-1ubuntu2.6+esm3  
unbound –  1.6.7-1ubuntu2.6+esm3  
16.04 xenial libunbound2 –  1.5.8-1ubuntu1.1+esm2  
unbound –  1.5.8-1ubuntu1.1+esm2  
14.04 trusty libunbound2 –  1.4.22-1ubuntu4.14.04.3+esm2  
unbound –  1.4.22-1ubuntu4.14.04.3+esm2  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›