Mageia 2019-0051: pdns-recursor security update
Summary
An issue has been found in PowerDNS Recursor where Lua hooks are not
properly applied to queries received over TCP in some specific
combination of settings, possibly bypassing security policies enforced
using Lua (CVE-2019-3806).
An issue has been found in PowerDNS Recursor where records in the answer
section of responses received from authoritative servers with the AA
flag not set were not properly validated, allowing an attacker to bypass
DNSSEC validation (CVE-2019-3807).
References
- https://bugs.mageia.org/show_bug.cgi?id=24218
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3807
Resolution
MGASA-2019-0051 - Updated pdns-recursor package fixes security vulnerabilities
SRPMS
- 6/core/pdns-recursor-4.1.9-1.mga6