You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa pdns-recursor

Sigurnosni nedostaci programskog paketa pdns-recursor

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for pdns-recursor

Announcement ID: openSUSE-SU-2018:4062-1
Rating: moderate
References: #1089814 #1114157 #1114169 #1114170 #1116592

Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12

An update that solves four vulnerabilities and has one
errata is now available.


This update for pdns-recursor to version 4.1.8 fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14644: Fixed denial of service via crafted query for meta-types
– CVE-2018-14626: Fixed packet cache pollution via crafted query
– CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)

Non-security issues fixed:

– Fixed build failure with Boost 1.67.0 (bsc#1089814).
– Revert ‘Keep the EDNS status of a server on FormErr with EDNS’
– Refuse queries for all meta-types

For more details about this update, refer to:

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-1524=1

Package List:

– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):



To unsubscribe, e-mail:
For additional commands, e-mail:

AutorJosip Papratovic
Cert idNCERT-REF-2018-12-0001-ADV
More in Preporuke
Sigurnosni nedostatak programskog paketa cups

Otkriven je sigurnosni nedostatak u programskom paketu cups za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje otkrivanje osjetljivih informacija....