CVE-2020-15474

NameCVE-2020-15474
DescriptionIn nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs972050

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ndpi (PTS)buster2.6-3fixed
buster (security)2.6-3+deb10u1fixed
trixie, bookworm4.2-2fixed
sid4.2-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ndpisourcestretch(not affected)
ndpisourcebuster(not affected)
ndpisource(unstable)3.4-1972050

Notes

[buster] - ndpi <not-affected> (Vulnerable code not present)
[stretch] - ndpi <not-affected> (Vulnerable code not present)
https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce (3.4)

Search for package or bug name: Reporting problems