[Bug 1182952] New: VUL-0: CVE-2019-13207: nsd: stack-based overflow in function dname_concatenate() in dname.c
http://bugzilla.opensuse.org/show_bug.cgi?id=1182952 Bug ID: 1182952 Summary: VUL-0: CVE-2019-13207: nsd: stack-based overflow in function dname_concatenate() in dname.c Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.2 Hardware: Other URL: https://smash.suse.de/issue/236309/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: amajer@suse.com Reporter: meissner@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#1727688 A vulnerability was discovered in nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c. Reference: https://github.com/NLnetLabs/nsd/issues/20 References: https://bugzilla.redhat.com/show_bug.cgi?id=1727688 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13207 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13207.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13207 https://github.com/NLnetLabs/nsd/issues/20 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorap... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1182952 http://bugzilla.opensuse.org/show_bug.cgi?id=1182952#c1 Marcus Meissner <meissner@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #1 from Marcus Meissner <meissner@suse.com> --- was fixed https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.or... -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com