Name | CVE-2020-19861 |
Description | When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2910-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ldns (PTS) | jessie | 1.6.17-5 | vulnerable |
stretch (security), stretch (lts), stretch | 1.7.0-1+deb9u1 | fixed | |
buster | 1.7.0-4 | vulnerable | |
bullseye | 1.7.1-2 | vulnerable | |
trixie, bookworm | 1.8.3-1 | fixed | |
sid | 1.8.3-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ldns | source | jessie | (unfixed) | end-of-life | ||
ldns | source | stretch | 1.7.0-1+deb9u1 | DLA-2910-1 | ||
ldns | source | (unstable) | 1.8.1-1 |
[bullseye] - ldns <no-dsa> (Minor issue)
[buster] - ldns <no-dsa> (Minor issue)
https://github.com/NLnetLabs/ldns/issues/51
https://github.com/NLnetLabs/ldns/commit/136ec420437041fe13f344a2053e774f9050cc38 (1.8.0-rc.1)