[USN-3673-1] Unbound vulnerability


–===============2611413680752202140==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”; boundary=”yEPQxsgoJgBvi8ip”
Content-Disposition: inline

–yEPQxsgoJgBvi8ip
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3673-1
June 07, 2018

unbound vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

A security issue was fixed in Unbound.

Software Description:
– unbound: validating, recursive, caching DNS resolver

Details:

Ralph Dolmans and Karst Koymans discovered that Unbound did not properly
handle certain NSEC records. An attacker could use this to to prove the
non-existence (NXDOMAIN answer) of an existing wildcard record, or trick
Unbound into accepting a NODATA proof.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libunbound2 1.6.7-1ubuntu2.1
unbound 1.6.7-1ubuntu2.1

Ubuntu 17.10:
libunbound2 1.6.5-1ubuntu0.2
unbound 1.6.5-1ubuntu0.2

Ubuntu 16.04 LTS:
libunbound2 1.5.8-1ubuntu1.1
unbound 1.5.8-1ubuntu1.1

Ubuntu 14.04 LTS:
libunbound2 1.4.22-1ubuntu4.14.04.3
unbound 1.4.22-1ubuntu4.14.04.3

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3673-1
CVE-2017-15105

Package Information:
https://launchpad.net/ubuntu/+source/unbound/1.6.7-1ubuntu2.1
https://launchpad.net/ubuntu/+source/unbound/1.6.5-1ubuntu0.2
https://launchpad.net/ubuntu/+source/unbound/1.5.8-1ubuntu1.1
https://launchpad.net/ubuntu/+source/unbound/1.4.22-1ubuntu4.14.04.3

–yEPQxsgoJgBvi8ip
Content-Type: application/pgp-signature; name=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=8BWi
—–END PGP SIGNATURE—–

–yEPQxsgoJgBvi8ip–

–===============2611413680752202140==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============2611413680752202140==–