vulnerability
Arch Linux: Insufficient validation (CVE-2020-26961)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Dec 9, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Dec 9, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in Firefox before 83.0 where, when DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-26961
- https://attackerkb.com/topics/CVE-2020-26961
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1672528
- URL-https://security.archlinux.org/ASA-202011-12
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2020-50/
- URL-https://www.mozilla.org/security/advisories/mfsa2020-50/
- URL-https://www.mozilla.org/security/advisories/mfsa2020-51/
- URL-https://www.mozilla.org/security/advisories/mfsa2020-52/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.