First published: Tue Mar 25 2025(Updated: )
It was discovered that SmartDNS did not correctly align certain objects in memory, leading to undefined behaviour. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2024-24198, CVE-2024-24199) It was discovered that SmartDNS did not correctly handle certain inputs, which could lead to an integer overflow. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-42643)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/smartdns | <46+dfsg-1ubuntu0.1 | 46+dfsg-1ubuntu0.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/smartdns | <45+dfsg-1ubuntu0.1~esm1 | 45+dfsg-1ubuntu0.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/smartdns | <35+dfsg-1ubuntu0.1~esm1 | 35+dfsg-1ubuntu0.1~esm1 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7370-1 is high due to the potential for denial of service and arbitrary code execution.
To fix USN-7370-1, upgrade the SmartDNS package to the latest version provided for your Ubuntu release.
USN-7370-1 affects Ubuntu 22.04 LTS, 24.04, and 24.10.
The vulnerability in USN-7370-1 is due to improper memory alignment in SmartDNS, leading to undefined behavior.
An attacker could exploit USN-7370-1 to cause a denial of service or execute arbitrary code on the affected systems.