bind9/lib
Ondřej Surý 67b4fb56e4
Invalid NSEC3 can cause OOB read of the isdelegation() stack
When .next_length is longer than NSEC3_MAX_HASH_LENGTH, it causes a
harmless out-of-bound read of the isdelegation() stack.  This patch
fixes the issue by skipping NSEC3 records with an oversized hash length
during validation.
2026-02-24 14:56:29 +01:00
..
dns Invalid NSEC3 can cause OOB read of the isdelegation() stack 2026-02-24 14:56:29 +01:00
isc Cleanup setting netmgr ports from isc_managers_create() 2026-02-20 16:37:44 +01:00
isccc switch isc_md_type_t to a proper enum 2026-02-02 11:12:55 +03:00
isccfg Minor logging improvements for key lifetime 2026-02-06 15:06:47 +00:00
ns Clear serve-stale flags when following the CNAME chains 2026-02-23 08:07:12 +01:00
.gitignore The isc/platform.h header has been completely removed 2021-07-06 05:33:48 +00:00
meson.build replace the build system with meson 2025-06-11 10:30:12 +03:00