An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2018-09-11T13:00:00

Updated: 2024-08-06T01:50:47.438Z

Reserved: 2016-08-23T00:00:00

Link: CVE-2016-7069

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-11T13:29:00.840

Modified: 2024-11-21T02:57:23.837

Link: CVE-2016-7069

cve-icon Redhat

No data.