--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2020-c0ff3df740
2020-06-14 17:10:11.229674
--------------------------------------------------------------------------------Name        : pdns-recursor
Product     : Fedora 31
Version     : 4.2.2
Release     : 1.fc31
URL         : https://www.powerdns.com/
Summary     : Modern, advanced and high performance recursing/non authoritative name server
Description :
PowerDNS Recursor is a non authoritative/recursing DNS server. Use this
package if you need a dns cache for your network.

--------------------------------------------------------------------------------Update Information:

Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
--------------------------------------------------------------------------------ChangeLog:

* Wed Jun  3 2020 Ruben Kerkhof  - 4.2.1-1
- Upstream released new version
  Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030
  See https://doc.powerdns.com/recursor/changelog/4.2.html#change-4.2.2 for more details
* Tue Dec 10 2019 Ruben Kerkhof  - 4.2.1-1
- Upstream released new version, including a fix for a memory leak
  See https://blog.powerdns.com/2019/12/09/powerdns-recursor-4-2-1-released for changes
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1837296 - pdns-recursor-4.3.1 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1837296
  [ 2 ] Bug #1838002 - bump powerdns to at lat 4.1.16 to fix CVEs
        https://bugzilla.redhat.com/show_bug.cgi?id=1838002
  [ 3 ] Bug #1839800 - CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities
        https://bugzilla.redhat.com/show_bug.cgi?id=1839800
  [ 4 ] Bug #1840184 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840184
  [ 5 ] Bug #1840185 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840185
  [ 6 ] Bug #1840192 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840192
  [ 7 ] Bug #1840193 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840193
  [ 8 ] Bug #1840281 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840281
  [ 9 ] Bug #1840282 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1840282
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-c0ff3df740' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Fedora 31: pdns-recursor FEDORA-2020-c0ff3df740

June 14, 2020
Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030

Summary

PowerDNS Recursor is a non authoritative/recursing DNS server. Use this

package if you need a dns cache for your network.

Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030

* Wed Jun 3 2020 Ruben Kerkhof - 4.2.1-1

- Upstream released new version

Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030

See https://doc.powerdns.com/recursor/changelog/4.2.html#change-4.2.2 for more details

* Tue Dec 10 2019 Ruben Kerkhof - 4.2.1-1

- Upstream released new version, including a fix for a memory leak

See https://blog.powerdns.com/2019/12/09/powerdns-recursor-4-2-1-released for changes

[ 1 ] Bug #1837296 - pdns-recursor-4.3.1 is available

https://bugzilla.redhat.com/show_bug.cgi?id=1837296

[ 2 ] Bug #1838002 - bump powerdns to at lat 4.1.16 to fix CVEs

https://bugzilla.redhat.com/show_bug.cgi?id=1838002

[ 3 ] Bug #1839800 - CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities

https://bugzilla.redhat.com/show_bug.cgi?id=1839800

[ 4 ] Bug #1840184 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840184

[ 5 ] Bug #1840185 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840185

[ 6 ] Bug #1840192 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840192

[ 7 ] Bug #1840193 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840193

[ 8 ] Bug #1840281 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840281

[ 9 ] Bug #1840282 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1840282

su -c 'dnf upgrade --advisory FEDORA-2020-c0ff3df740' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

FEDORA-2020-c0ff3df740 2020-06-14 17:10:11.229674 Product : Fedora 31 Version : 4.2.2 Release : 1.fc31 URL : https://www.powerdns.com/ Summary : Modern, advanced and high performance recursing/non authoritative name server Description : PowerDNS Recursor is a non authoritative/recursing DNS server. Use this package if you need a dns cache for your network. Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030 * Wed Jun 3 2020 Ruben Kerkhof - 4.2.1-1 - Upstream released new version Fixes CVE-2020-10995, CVE-2020-12244 and CVE-2020-10030 See https://doc.powerdns.com/recursor/changelog/4.2.html#change-4.2.2 for more details * Tue Dec 10 2019 Ruben Kerkhof - 4.2.1-1 - Upstream released new version, including a fix for a memory leak See https://blog.powerdns.com/2019/12/09/powerdns-recursor-4-2-1-released for changes [ 1 ] Bug #1837296 - pdns-recursor-4.3.1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1837296 [ 2 ] Bug #1838002 - bump powerdns to at lat 4.1.16 to fix CVEs https://bugzilla.redhat.com/show_bug.cgi?id=1838002 [ 3 ] Bug #1839800 - CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 pdns-recursor: multiple vulnerabilities https://bugzilla.redhat.com/show_bug.cgi?id=1839800 [ 4 ] Bug #1840184 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840184 [ 5 ] Bug #1840185 - CVE-2020-10030 pdns-recursor: stack-based out-of-bounds read via a larger hostname [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840185 [ 6 ] Bug #1840192 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840192 [ 7 ] Bug #1840193 - CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840193 [ 8 ] Bug #1840281 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840281 [ 9 ] Bug #1840282 - CVE-2020-10995 pdns-recursor: issue in DNS protocol allows malicious parties to use recursive DNS services to attack third party authoritative name servers [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1840282 su -c 'dnf upgrade --advisory FEDORA-2020-c0ff3df740' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Change Log

References

Update Instructions

Severity
Product : Fedora 31
Version : 4.2.2
Release : 1.fc31
URL : https://www.powerdns.com/
Summary : Modern, advanced and high performance recursing/non authoritative name server

Related News