From 1548213976a3ac1f2ac14bd7415b5086f3661cfd Mon Sep 17 00:00:00 2001 From: Lev Lamberov Date: Fri, 22 May 2020 08:44:30 +0500 Subject: [SECURITY] [DSA 4691-1] pdns-recursor security update --- english/security/2020/dsa-4691.data | 13 +++++++++++++ english/security/2020/dsa-4691.wml | 25 +++++++++++++++++++++++++ 2 files changed, 38 insertions(+) create mode 100644 english/security/2020/dsa-4691.data create mode 100644 english/security/2020/dsa-4691.wml (limited to 'english') diff --git a/english/security/2020/dsa-4691.data b/english/security/2020/dsa-4691.data new file mode 100644 index 00000000000..1252d48a760 --- /dev/null +++ b/english/security/2020/dsa-4691.data @@ -0,0 +1,13 @@ +DSA-4691-1 pdns-recursor +2020-5-21 +CVE-2020-10955 CVE-2020-12244 +pdns-recursor +yes +yes +no + +#use wml::debian::security + + + + diff --git a/english/security/2020/dsa-4691.wml b/english/security/2020/dsa-4691.wml new file mode 100644 index 00000000000..863cbf4fdf7 --- /dev/null +++ b/english/security/2020/dsa-4691.wml @@ -0,0 +1,25 @@ +security update + +

Two vulnerabiliites have been discovered in PDNS Recursor, a resolving +name server; a traffic amplification attack against third party +authoritative name servers (NXNSAttack) and insufficient validation of +NXDOMAIN responses lacking an SOA.

+ +

The version of pdns-recursor in the oldstable distribution (stretch) is +no longer supported. If these security issues affect your setup, you +should upgrade to the stable distribution (buster).

+ +

For the stable distribution (buster), these problems have been fixed in +version 4.1.11-1+deb10u1.

+ +

We recommend that you upgrade your pdns-recursor packages.

+ +

For the detailed security status of pdns-recursor please refer to +its security tracker page at: +\ +https://security-tracker.debian.org/tracker/pdns-recursor

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2020/dsa-4691.data" +# $Id: $ -- cgit v1.2.3