First published: Thu Aug 08 2024(Updated: )
A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly.
Credit: secalert@redhat.com sep@nlnetlabs.nl
Affected Software | Affected Version | How to fix |
---|---|---|
debian/unbound | <=1.13.1-1+deb11u2<=1.17.1-2+deb12u2<=1.20.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.