Gentoo: GLSA-202012-19: PowerDNS Recursor: Denial of service
Summary
It was discovered that it was possible to update the DNSSEC validation state to a bogus state for a cached record via DNS ANY query.
Resolution
All PowerDNS Recursor users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-4.3.5"
References
[ 1 ] CVE-2020-25829
https://nvd.nist.gov/vuln/detail/CVE-2020-25829
[ 2 ] PowerDNS Security Advisory 2020-07
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202012-19
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
PowerDNS Recursor is a high-end, high-performance resolving name server.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/pdns-recursor < 4.3.5 >= 4.3.5
Impact
===== A remote attacker could send specially crafted DNS queries to deny DNSSEC validation.
Workaround
There is no known workaround at this time.