CVE-2026-40622

Publication date 20 May 2026

Last updated 22 May 2026


Ubuntu priority

Description

NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value ('cache-max-ttl'). In configurations where 'harden-referral-path: yes' is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query. Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.

Read the notes from the security team

Status

Package Ubuntu Release Status
unbound 26.04 LTS resolute
Fixed 1.24.2-1ubuntu2.1
25.10 questing
Fixed 1.22.0-2ubuntu2.3
24.04 LTS noble
Fixed 1.19.2-1ubuntu3.8
22.04 LTS jammy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Not affected
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Not affected

Notes


mdeslaur

Only affects 1.16.2 and higher

References

Related Ubuntu Security Notices (USN)

Other references


Access our resources on patching vulnerabilities