First published: Thu Aug 03 2023(Updated: )
Xiang Li discovered that MaraDNS incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2022-30256) Huascar Tejeda discovered that MaraDNS incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-31137)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/maradns-zoneserver | <2.0.13-1.4+deb11u1build0.23.04.1 | 2.0.13-1.4+deb11u1build0.23.04.1 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/duende | <2.0.13-1.4+deb11u1build0.23.04.1 | 2.0.13-1.4+deb11u1build0.23.04.1 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/maradns | <2.0.13-1.4+deb11u1build0.23.04.1 | 2.0.13-1.4+deb11u1build0.23.04.1 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/maradns-deadwood | <2.0.13-1.4+deb11u1build0.23.04.1 | 2.0.13-1.4+deb11u1build0.23.04.1 |
Ubuntu Linux | =23.04 | |
All of | ||
ubuntu/maradns-zoneserver | <2.0.13-1.4+deb11u1build0.22.04.1 | 2.0.13-1.4+deb11u1build0.22.04.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/duende | <2.0.13-1.4+deb11u1build0.22.04.1 | 2.0.13-1.4+deb11u1build0.22.04.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/maradns | <2.0.13-1.4+deb11u1build0.22.04.1 | 2.0.13-1.4+deb11u1build0.22.04.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/maradns-deadwood | <2.0.13-1.4+deb11u1build0.22.04.1 | 2.0.13-1.4+deb11u1build0.22.04.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/maradns-zoneserver | <2.0.13-1.4+deb11u1build0.20.04.1 | 2.0.13-1.4+deb11u1build0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/duende | <2.0.13-1.4+deb11u1build0.20.04.1 | 2.0.13-1.4+deb11u1build0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/maradns | <2.0.13-1.4+deb11u1build0.20.04.1 | 2.0.13-1.4+deb11u1build0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/maradns-deadwood | <2.0.13-1.4+deb11u1build0.20.04.1 | 2.0.13-1.4+deb11u1build0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/maradns-zoneserver | <2.0.13-1.2ubuntu0.1~esm1 | 2.0.13-1.2ubuntu0.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/duende | <2.0.13-1.2ubuntu0.1~esm1 | 2.0.13-1.2ubuntu0.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/maradns | <2.0.13-1.2ubuntu0.1~esm1 | 2.0.13-1.2ubuntu0.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/maradns-deadwood | <2.0.13-1.2ubuntu0.1~esm1 | 2.0.13-1.2ubuntu0.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/maradns-zoneserver | <2.0.13-1ubuntu0.1~esm1 | 2.0.13-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/duende | <2.0.13-1ubuntu0.1~esm1 | 2.0.13-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/maradns | <2.0.13-1ubuntu0.1~esm1 | 2.0.13-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/maradns-deadwood | <2.0.13-1ubuntu0.1~esm1 | 2.0.13-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6271-1 is considered high due to the potential exposure of sensitive information.
To fix USN-6271-1, you should update your affected packages to the recommended versions listed in the security notice.
The affected packages by USN-6271-1 include maradns, maradns-zoneserver, maradns-deadwood, and duende in specific versions.
Versions of maradns packages prior to 2.0.13-1.4+deb11u1build0.23.04.1 are vulnerable to the issues described in USN-6271-1.
Yes, USN-6271-1 affects Ubuntu versions 16.04, 18.04, 20.04, and 22.04.