——————————————————————————–
Fedora Update Notification
FEDORA-2020-c0ff3df740
2020-06-14 17:10:11.229674
——————————————————————————–
Name : pdns-recursor
Product : Fedora 31
Version : 4.2.2
Release : 1.fc31
URL : https://powerdns.com
Summary : Modern, advanced and high performance recursing/non authoritative name server
Description :
PowerDNS Recursor is a non authoritative/recursing DNS server. Use this
package if you need a dns cache for your network.
——————————————————————————–
Update Information:
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
——————————————————————————–
ChangeLog:
* Wed Jun 3 2020 Ruben Kerkhof <ruben@rubenkerkhof.com> – 4.2.1-1
– Upstream released new version
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
See https://doc.powerdns.com/recursor/changelog/4.2.html#change-4.2.2 for more details
* Tue Dec 10 2019 Ruben Kerkhof <ruben@rubenkerkhof.com> – 4.2.1-1
– Upstream released new version, including a fix for a memory leak
See https://blog.powerdns.com/2019/12/09/powerdns-recursor-4-2-1-released/ for changes
——————————————————————————–
References:
[ 1 ] Bug #1837296 – pdns-recursor-4.3.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1837296
[ 2 ] Bug #1838002 – bump powerdns to at lat 4.1.16 to fix CVEs
https://bugzilla.redhat.com/show_bug.cgi?id=1838002
[ 3 ] Bug #1839800 – CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1839800
[ 4 ] Bug #1840184 – CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840184
[ 5 ] Bug #1840185 – CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840185
[ 6 ] Bug #1840192 – CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840192
[ 7 ] Bug #1840193 – CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840193
[ 8 ] Bug #1840281 – CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840281
[ 9 ] Bug #1840282 – CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840282
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-c0ff3df740’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2020-d9abb0c06d
2020-06-14 17:01:14.115566
——————————————————————————–
Name : pdns-recursor
Product : Fedora 32
Version : 4.3.1
Release : 1.fc32
URL : https://powerdns.com
Summary : Modern, advanced and high performance recursing/non authoritative name server
Description :
PowerDNS Recursor is a non authoritative/recursing DNS server. Use this
package if you need a dns cache for your network.
——————————————————————————–
Update Information:
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
——————————————————————————–
ChangeLog:
* Wed Jun 3 2020 Ruben Kerkhof <ruben@rubenkerkhof.com> – 4.3.1-1
– Upstream released new version
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
See https://doc.powerdns.com/recursor/changelog/4.3.html#change-4.3.1 for more details
——————————————————————————–
References:
[ 1 ] Bug #1837296 – pdns-recursor-4.3.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1837296
[ 2 ] Bug #1838002 – bump powerdns to at lat 4.1.16 to fix CVEs
https://bugzilla.redhat.com/show_bug.cgi?id=1838002
[ 3 ] Bug #1839800 – CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities
https://bugzilla.redhat.com/show_bug.cgi?id=1839800
[ 4 ] Bug #1840184 – CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840184
[ 5 ] Bug #1840185 – CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840185
[ 6 ] Bug #1840192 – CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840192
[ 7 ] Bug #1840193 – CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840193
[ 8 ] Bug #1840281 – CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840281
[ 9 ] Bug #1840282 – CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1840282
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-d9abb0c06d’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org