Upstream information
Description
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
SUSE Bugzilla entry: 1121889 [RESOLVED / FIXED]SUSE Security Advisories:
- openSUSE-SU-2019:0100-1, published Tue, 29 Jan 2019 15:19:47 +0100 (CET)
- openSUSE-SU-2019:0107-1, published Thu, 31 Jan 2019 18:09:43 +0100 (CET)
- openSUSE-SU-2019:0131-1, published Mon, 4 Feb 2019 18:09:06 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub 12 SP1 |
| Patchnames: openSUSE-2019-131 |
SUSE Package Hub 15 |
| Patchnames: openSUSE-2019-107 |
openSUSE Leap 15.0 |
| Patchnames: openSUSE-2019-100 |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA pdns-recursor-4.5.5-1.3 |
SUSE Timeline for this CVE
CVE page created: Tue Jan 15 20:31:44 2019CVE page last modified: Tue May 23 15:10:13 2023