USN-7370-1

Source
https://ubuntu.com/security/notices/USN-7370-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7370-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7370-1
Upstream
Related
Published
2025-03-25T02:06:39Z
Modified
2026-02-10T04:47:19Z
Summary
smartdns vulnerabilities
Details

It was discovered that SmartDNS did not correctly align certain objects in memory, leading to undefined behaviour. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2024-24198, CVE-2024-24199)

It was discovered that SmartDNS did not correctly handle certain inputs, which could lead to an integer overflow. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2024-42643)

References

Affected packages

Ubuntu:Pro:22.04:LTS / smartdns

Package

Name
smartdns
Purl
pkg:deb/ubuntu/smartdns@35+dfsg-1ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
35+dfsg-1ubuntu0.1~esm1

Affected versions

33+dfsg-2.*
33+dfsg-2.1
33+dfsg-2.1build1
Other
35+dfsg-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "35+dfsg-1ubuntu0.1~esm1",
            "binary_name": "smartdns"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-24198"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-24199"
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7370-1.json"

Ubuntu:Pro:24.04:LTS / smartdns

Package

Name
smartdns
Purl
pkg:deb/ubuntu/smartdns@45+dfsg-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
45+dfsg-1ubuntu0.1~esm1

Affected versions

Other
42+dfsg-1
43+dfsg-1
45+dfsg-1
45+dfsg-1build1
45+dfsg-1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "45+dfsg-1ubuntu0.1~esm1",
            "binary_name": "smartdns"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2024-42643"
        }
    ],
    "ecosystem": "Ubuntu:Pro:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7370-1.json"