An issue was discovered in adns before 1.5.2. It overruns reading a buffer
if a domain ends with backslash. If the query domain ended with \, and
adns_qf_quoteok_query was specified, qdparselabel would read additional
bytes from the buffer and try to treat them as the escape sequence. It
would depart the input buffer and start processing many bytes of arbitrary
heap data as if it were the query domain. Eventually it would run out of
input or find some other kind of error, and declare the query domain
invalid. But before then it might outrun available memory and crash. In
principle this could be a denial of service attack.
Source: adns (LP Ubuntu Debian)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):not-affected (1.6.0-2)
More Information

Updated: 2020-09-09 21:39:34 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)