CVE-2017-9109

Priority
Description
An issue was discovered in adns before 1.5.2. It fails to ignore apparent
answers before the first RR that was found the first time. when this is
fixed, the second answer scan finds the same RRs at the first. Otherwise,
adns can be confused by interleaving answers for the CNAME target, with the
CNAME itself. In that case the answer data structure (on the heap) can be
overrun. With this fixed, it prefers to look only at the answer RRs which
come after the CNAME, which is at least arguably correct.
Notes
Package
Source: adns (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):not-affected (1.6.0-2)
More Information

Updated: 2020-09-09 21:39:35 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)