CVE-2020-19861

NameCVE-2020-19861
DescriptionWhen a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2910-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ldns (PTS)buster1.7.0-4vulnerable
bullseye1.7.1-2vulnerable
trixie, bookworm1.8.3-1fixed
sid1.8.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ldnssourcestretch1.7.0-1+deb9u1DLA-2910-1
ldnssource(unstable)1.8.1-1

Notes

[bullseye] - ldns <no-dsa> (Minor issue)
[buster] - ldns <no-dsa> (Minor issue)
https://github.com/NLnetLabs/ldns/issues/51
https://github.com/NLnetLabs/ldns/commit/136ec420437041fe13f344a2053e774f9050cc38 (1.8.0-rc.1)

Search for package or bug name: Reporting problems