]> git.ipfire.org Git - thirdparty/bind9.git/commit
Invalid NSEC3 can cause OOB read of the isdelegation() stack
authorOndřej Surý <ondrej@isc.org>
Sat, 14 Feb 2026 13:43:41 +0000 (14:43 +0100)
committerOndřej Surý <ondrej@sury.org>
Tue, 24 Feb 2026 13:56:29 +0000 (14:56 +0100)
commit67b4fb56e40bf856e1fccd41e752d5f486b5b569
treeab38663902b96e0e6b967473626b00bcb53de328
parentd4ec8ebee84b15702d4c3f01d80c91ba2c19e2a7
Invalid NSEC3 can cause OOB read of the isdelegation() stack

When .next_length is longer than NSEC3_MAX_HASH_LENGTH, it causes a
harmless out-of-bound read of the isdelegation() stack.  This patch
fixes the issue by skipping NSEC3 records with an oversized hash length
during validation.
lib/dns/rdata/generic/nsec3_50.c
lib/dns/validator.c