—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
– ————————————————————————-
Debian Security Advisory DSA-4063-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 11, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : pdns-recursor
CVE ID : CVE-2017-15120
Toshifumi Sakaguchi discovered that PowerDNS Recursor, a high-performance
resolving name server was susceptible to denial of service via a crafted
CNAME answer.
The oldstable distribution (jessie) is not affected.
For the stable distribution (stretch), this problem has been fixed in
version 4.0.4-1+deb9u3.
We recommend that you upgrade your pdns-recursor packages.
For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=T9ea
—–END PGP SIGNATURE—–