On Wed, 3 Jul 2024 16:29:38 -0700
Cy Schubert <cy.schub...@cschubert.com> wrote:

> On Wed, 3 Jul 2024 13:00:41 +0000
> "Wall, Stephen" <stephen.w...@redcom.com> wrote:
> 
> > > From: Dag-Erling Smørgrav <d...@freebsd.org>
> > > The base system unbound is meant to be used with a configuration 
> > > generated by
> > > `local-unbound-setup`, which never enables the `ede` option which is a
> > > prerequisite for the DoS attack described in CVE-2024-1931.  
> 
> Did you actually mean CVE-2024-33655 instead?

Looks like CVE-2024-1931 was also addressed in 1.20.0.

>   
> > 
> > Thanks for your reply.
> > 
> > Local_unbound_setup supports dropping additional config files in 
> > /var/unbound/conf.d, which will be loaded by unbound.  Files in this 
> > directory are not altered by local_unbound_setup.  This implies, to me, 
> > that customization of the base unbound is specifically supported, meaning 
> > any FreeBSD site could potentially have ede enabled, and therefore by 
> > vulnerable to this CVE.
> > It's my opinion that this warrants at least an advisory cautioning users of 
> > FreeBSD not to enable ede, if not a patch to address it.  
> 
> That would be an MFS of 335c7cda12138f2aefa41fb739707612cc12a9be from
> stable/14 to releng/14.0 (releng/14.1 already has it) and a
> corresponding MFS from stable/13 to releng/13.{2,3}.
> 
> > 
> > - Steve Wall  
> 



-- 
Cheers,
Cy Schubert <cy.schub...@cschubert.com>
FreeBSD UNIX:  <c...@freebsd.org>   Web:  https://FreeBSD.org
NTP:           <c...@nwtime.org>    Web:  https://nwtime.org

                        e^(i*pi)+1=0

Reply via email to