Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Add patch for CVE-2024-43168 in unbound #10158

Merged
merged 1 commit into from
Aug 16, 2024

Conversation

aadhar-agarwal
Copy link
Contributor

@aadhar-agarwal aadhar-agarwal commented Aug 15, 2024

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

What does the PR accomplish, why was it needed?

  • This PR addressed CVE-2024-43168 in unbound
  • A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption
Change Log
Does this affect the toolchain?

NO

Associated issues
Links to CVEs
Test Methodology

@aadhar-agarwal aadhar-agarwal marked this pull request as ready for review August 15, 2024 23:49
@aadhar-agarwal aadhar-agarwal requested a review from a team as a code owner August 15, 2024 23:49
@mfrw mfrw added security 3.0-dev PRs Destined for AzureLinux 3.0 labels Aug 16, 2024
Copy link
Member

@mfrw mfrw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@aadhar-agarwal aadhar-agarwal merged commit 9e1ba9c into 3.0-dev Aug 16, 2024
12 checks passed
@aadhar-agarwal aadhar-agarwal deleted the aadagarwal/CVE-2024-43168-3.0-dev branch August 16, 2024 18:46
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
3.0-dev PRs Destined for AzureLinux 3.0 Packaging security
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants