Gentoo: GLSA-202012-19: PowerDNS Recursor: Denial of service
Gentoo: GLSA-202012-19: PowerDNS Recursor: Denial of service
A vulnerability in PowerDNS Recursor could lead to a Denial of Service condition.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202012-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: PowerDNS Recursor: Denial of service
Date: December 23, 2020
Bugs: #746923
ID: 202012-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability in PowerDNS Recursor could lead to a Denial of Service
condition.
Background
==========
PowerDNS Recursor is a high-end, high-performance resolving name
server.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/pdns-recursor < 4.3.5 >= 4.3.5
Description
===========
It was discovered that it was possible to update the DNSSEC validation
state to a bogus state for a cached record via DNS ANY query.
Impact
======
A remote attacker could send specially crafted DNS queries to deny
DNSSEC validation.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PowerDNS Recursor users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-4.3.5"
References
==========
[ 1 ] CVE-2020-25829
https://nvd.nist.gov/vuln/detail/CVE-2020-25829
[ 2 ] PowerDNS Security Advisory 2020-07
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202012-19
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
This email address is being protected from spambots. You need JavaScript enabled to view it. or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5