CVE-2019-13207 (https://nvd.nist.gov/vuln/detail/CVE-2019-13207): nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Upstream fix: https://github.com/NLnetLabs/nsd/commit/91102da24d5949ccfec8fdab5bae2d01c4cabab5
@ arches, please test and mark stable: =net-dns/nsd-4.2.2
x86 stable
amd64 stable. Maintainer(s), please cleanup. Security, please vote.
GLSA Vote: No GLSA! @ maintainer(s): Please cleanup and drop <net-dns/nsd-4.2.2!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=753a9b1932a3418047724df7276c245c0c10d15d commit 753a9b1932a3418047724df7276c245c0c10d15d Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2019-10-07 08:03:32 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2019-10-07 08:03:58 +0000 net-dns/nsd: Security cleanup Bug: https://bugs.gentoo.org/695534 Package-Manager: Portage-2.3.76, Repoman-2.3.17 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> net-dns/nsd/Manifest | 2 - net-dns/nsd/nsd-4.1.27.ebuild | 116 ---------------------------------------- net-dns/nsd/nsd-4.2.1-r1.ebuild | 115 --------------------------------------- 3 files changed, 233 deletions(-)
Repository is clean, all done!