openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2024:0048-1
Rating:             important
References:         #1209897 #1219823 #1219826 
Cross-References:   CVE-2023-26437 CVE-2023-50387 CVE-2023-50868
                   
CVSS scores:
                    CVE-2023-26437 (NVD) : 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L
                    CVE-2023-50387 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2023-50868 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    openSUSE Backports SLE-15-SP5
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for pdns-recursor fixes the following issues:

   Update to 4.8.6:

   * fixes case when crafted DNSSEC records in a zone can lead to a denial of
     service in Recursor
        4-01.html (boo#1219823, boo#1219826, CVE-2023-50387, CVE-2023-50868)


   Changes in 4.8.5:

   * (I)XFR: handle partial read of len prefix.
   * YaHTTP: Prevent integer overflow on very large chunks.
   * Fix setting of policy tags for packet cache hits.

   Changes in 4.8.4:

   * Deterred spoofing attempts can lead to authoritative servers being
     marked unavailable (boo#1209897, CVE-2023-26437)


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP5:

      zypper in -t patch openSUSE-2024-48=1



Package List:

   - openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64):

      pdns-recursor-4.8.6-bp155.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2023-26437.html
   https://www.suse.com/security/cve/CVE-2023-50387.html
   https://www.suse.com/security/cve/CVE-2023-50868.html
   https://bugzilla.suse.com/1209897
   https://bugzilla.suse.com/1219823
   https://bugzilla.suse.com/1219826

openSUSE: 2024:0048-1 important: pdns-recursor

February 14, 2024
An update that fixes three vulnerabilities is now available

Description

This update for pdns-recursor fixes the following issues: Update to 4.8.6: * fixes case when crafted DNSSEC records in a zone can lead to a denial of service in Recursor 4-01.html (boo#1219823, boo#1219826, CVE-2023-50387, CVE-2023-50868) Changes in 4.8.5: * (I)XFR: handle partial read of len prefix. * YaHTTP: Prevent integer overflow on very large chunks. * Fix setting of policy tags for packet cache hits. Changes in 4.8.4: * Deterred spoofing attempts can lead to authoritative servers being marked unavailable (boo#1209897, CVE-2023-26437)

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-48=1


Package List

- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64): pdns-recursor-4.8.6-bp155.2.3.1


References

https://www.suse.com/security/cve/CVE-2023-26437.html https://www.suse.com/security/cve/CVE-2023-50387.html https://www.suse.com/security/cve/CVE-2023-50868.html https://bugzilla.suse.com/1209897 https://bugzilla.suse.com/1219823 https://bugzilla.suse.com/1219826


Severity
Announcement ID: openSUSE-SU-2024:0048-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP5 .

Related News