DescriptionA Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
- openSUSE-SU-2019:1904-1, published Thu, 15 Aug 2019 15:14:02 +0200 (CEST)
- openSUSE-SU-2019:1921-1, published Thu, 15 Aug 2019 21:10:51 +0200 (CEST)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Package Hub 12 SP1|| ||Patchnames: |
|SUSE Package Hub 15 SP1|| ||Patchnames: |
|SUSE Package Hub 15|| ||Patchnames: |
|openSUSE Leap 15.0|| ||Patchnames: |
|openSUSE Leap 15.1|| ||Patchnames: |
|openSUSE Tumbleweed|| ||Patchnames: |
openSUSE Tumbleweed GA pdns-4.5.1-1.5
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||pdns||Not affected|
|SUSE OpenStack Cloud 8||pdns||Not affected|
|SUSE OpenStack Cloud 9||pdns||Not affected|