CVE-2020-35857: Stack consumption in trust-dns-server
(updated )
There’s a stack overflow leading to a crash and potential DOS when processing additional records for return of MX or SRV record types from the server. This is only possible when a zone is configured with a null target for MX or SRV records. Prior to 0.16.0 the additional record processing was not supported by trust-dns-server. There Are no known issues with upgrading from 0.16 or 0.17 to 0.18.1. The remidy should be to upgrade to 0.18.1. If unable to do so, MX, SRV or other record types with a target to the null type, should be avoided.
References
- github.com/advisories/GHSA-4cww-f7w5-x525
- github.com/bluejekyll/trust-dns
- github.com/bluejekyll/trust-dns/commit/8b9eab05795fdc098976262853b2498055c7a8f3
- github.com/bluejekyll/trust-dns/issues/980
- github.com/bluejekyll/trust-dns/pull/982
- nvd.nist.gov/vuln/detail/CVE-2020-35857
- rustsec.org/advisories/RUSTSEC-2020-0001.html
Detect and mitigate CVE-2020-35857 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →