A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.
Workaround:
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:1750 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:1751 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:1780 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:1801 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:1802 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:1804 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:2587 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2024:2696 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2025:0837 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-1488 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2264183 | patch issue tracking |