Add entry for dns/powerdns
PR: 233139 Submitted by: maintainer
This commit is contained in:
parent
29bbd4bacd
commit
8fe64c6a69
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=485425
1 changed files with 41 additions and 0 deletions
|
@ -58,6 +58,47 @@ Notes:
|
|||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="0aee2f13-ec1d-11e8-8c92-6805ca2fa271">
|
||||
<topic>powerdns -- Multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>powerdns</name>
|
||||
<range><lt>4.1.5</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>PowerDNS Team reports:</p>
|
||||
<blockquote cite="https://doc.powerdns.com/authoritative/changelog/4.1.html">
|
||||
<p>CVE-2018-10851: An issue has been found in PowerDNS Authoritative Server allowing
|
||||
an authorized user to cause a memory leak by inserting a specially crafted record
|
||||
in a zone under their control, then sending a DNS query for that record. The issue
|
||||
is due to the fact that some memory is allocated before the parsing and is not
|
||||
always properly released if the record is malformed. When the PowerDNS
|
||||
Authoritative Server is run inside the guardian (--guardian), or inside a
|
||||
supervisor like supervisord or systemd, an out-of-memory crash will lead to an
|
||||
automatic restart, limiting the impact to a somewhat degraded service.</p>
|
||||
<p>CVE-2018-14626: An issue has been found in PowerDNS Authoritative Server allowing
|
||||
a remote user to craft a DNS query that will cause an answer without DNSSEC
|
||||
records to be inserted into the packet cache and be returned to clients asking for
|
||||
DNSSEC records, thus hiding the presence of DNSSEC signatures for a specific qname
|
||||
and qtype. For a DNSSEC-signed domain, this means that DNSSEC validating clients
|
||||
will consider the answer to be bogus until it expires from the packet cache,
|
||||
leading to a denial of service.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://doc.powerdns.com/authoritative/changelog/4.1.html</url>
|
||||
<cvename>CVE-2018-10851</cvename>
|
||||
<cvename>CVE-2018-14626</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2018-11-06</discovery>
|
||||
<entry>2018-11-19</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="e9aa0e4c-ea8b-11e8-a5b7-00e04c1ea73d">
|
||||
<topic>powerdns-recursor -- Multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Reference in a new issue