CVE-2020-26961

NameCVE-2020-26961
DescriptionWhen DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2457-1, DLA-2464-1, DSA-4793-1, DSA-4796-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid133.0-1fixed
firefox-esr (PTS)bullseye115.14.0esr-1~deb11u1fixed
bullseye (security)128.5.0esr-1~deb11u1fixed
bookworm128.3.1esr-1~deb12u1fixed
bookworm (security)128.5.0esr-1~deb12u1fixed
sid, trixie128.5.0esr-1fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1fixed
bullseye (security)1:128.5.0esr-1~deb11u1fixed
bookworm1:115.16.0esr-1~deb12u1fixed
bookworm (security)1:128.5.0esr-1~deb12u1fixed
sid, trixie1:128.5.0esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)83.0-1
firefox-esrsourcestretch78.5.0esr-1~deb9u1DLA-2457-1
firefox-esrsourcebuster78.5.0esr-1~deb10u1DSA-4793-1
firefox-esrsource(unstable)78.5.0esr-1
thunderbirdsourcestretch1:78.5.0-1~deb9u1DLA-2464-1
thunderbirdsourcebuster1:78.5.0-1~deb10u1DSA-4796-1
thunderbirdsource(unstable)1:78.5.0-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2020-50/#CVE-2020-26961
https://www.mozilla.org/en-US/security/advisories/mfsa2020-51/#CVE-2020-26961
https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/#CVE-2020-26961

Search for package or bug name: Reporting problems