From 441d1370330332b7d78f238d2f5e13f7aed5e4e0 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Fri, 25 Dec 2020 23:06:25 +0000 Subject: gentoo christmass resync : 25.12.2020 --- metadata/glsa/glsa-202012-18.xml | 55 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 metadata/glsa/glsa-202012-18.xml (limited to 'metadata/glsa/glsa-202012-18.xml') diff --git a/metadata/glsa/glsa-202012-18.xml b/metadata/glsa/glsa-202012-18.xml new file mode 100644 index 000000000000..f7fbf13a6da1 --- /dev/null +++ b/metadata/glsa/glsa-202012-18.xml @@ -0,0 +1,55 @@ + + + + PowerDNS: information disclosure + An information disclosure vulnerability in PowerDNS allow remote + attackers to obtain sensitive information. + + pdns + 2020-12-23 + 2020-12-23 + 744160 + remote + + + 4.3.1 + 4.3.1 + + + +

The PowerDNS nameserver is an authoritative-only nameserver which uses a + flexible backend architecture. +

+
+ +

It was discovered that PowerDNS did not properly handle certain unknown + records. +

+
+ +

An authorized attacker with the ability to insert crafted records into a + zone might be able to leak the content of uninitialized memory. Crafted + records cannot be inserted via AXFR. +

+
+ +

Do not take zone data from untrusted users.

+
+ +

All PowerDNS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/pdns-4.3.1" + + +
+ + CVE-2020-17482 + + PowerDNS Security Advisory 2020-05 + + + whissi + whissi +
-- cgit v1.2.3