-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2020-d9abb0c06d 2020-06-14 17:01:14.115566 --------------------------------------------------------------------------------
Name : pdns-recursor Product : Fedora 32 Version : 4.3.1 Release : 1.fc32 URL : https://powerdns.com Summary : Modern, advanced and high performance recursing/non authoritative name server Description : PowerDNS Recursor is a non authoritative/recursing DNS server. Use this package if you need a dns cache for your network.
-------------------------------------------------------------------------------- Update Information:
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030 -------------------------------------------------------------------------------- ChangeLog:
* Wed Jun 3 2020 Ruben Kerkhof ruben@rubenkerkhof.com - 4.3.1-1 - Upstream released new version Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030 See https://doc.powerdns.com/recursor/changelog/4.3.html#change-4.3.1 for more details -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1837296 - pdns-recursor-4.3.1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1837296 [ 2 ] Bug #1838002 - bump powerdns to at lat 4.1.16 to fix CVEs https://bugzilla.redhat.com/show_bug.cgi?id=1838002 [ 3 ] Bug #1839800 - CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities https://bugzilla.redhat.com/show_bug.cgi?id=1839800 [ 4 ] Bug #1840184 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840184 [ 5 ] Bug #1840185 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840185 [ 6 ] Bug #1840192 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840192 [ 7 ] Bug #1840193 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840193 [ 8 ] Bug #1840281 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840281 [ 9 ] Bug #1840282 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840282 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-d9abb0c06d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------