Gentoo: GLSA-202012-18: PowerDNS: information disclosure
Summary
It was discovered that PowerDNS did not properly handle certain unknown records.
Resolution
All PowerDNS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-4.3.1"
References
[ 1 ] CVE-2020-17482
https://nvd.nist.gov/vuln/detail/CVE-2020-17482
[ 2 ] PowerDNS Security Advisory 2020-05
https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-05.html
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202012-18
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
The PowerDNS nameserver is an authoritative-only nameserver which uses a flexible backend architecture.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/pdns < 4.3.1 >= 4.3.1
Impact
===== An authorized attacker with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory. Crafted records cannot be inserted via AXFR.
Workaround
Do not take zone data from untrusted users.