You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa pdns-recursor

Sigurnosni nedostaci programskog paketa pdns-recursor

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4151-1
Rating: moderate
References: #1114157 #1114169 #1114170
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for pdns-recursor fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
– CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1564=1

Package List:

– openSUSE Leap 42.3 (x86_64):

pdns-recursor-4.0.5-9.1
pdns-recursor-debuginfo-4.0.5-9.1
pdns-recursor-debugsource-4.0.5-9.1

References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://www.suse.com/security/cve/CVE-2018-14644.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169
https://bugzilla.suse.com/1114170


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4152-1
Rating: moderate
References: #1114157 #1114169 #1114170 #1116592
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
CVE-2018-16855
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for pdns-recursor fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
– CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
– CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1565=1

Package List:

– openSUSE Leap 15.0 (x86_64):

pdns-recursor-4.1.2-lp150.2.3.1
pdns-recursor-debuginfo-4.1.2-lp150.2.3.1
pdns-recursor-debugsource-4.1.2-lp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://www.suse.com/security/cve/CVE-2018-14644.html
https://www.suse.com/security/cve/CVE-2018-16855.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169
https://bugzilla.suse.com/1114170
https://bugzilla.suse.com/1116592


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for pdns
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4156-1
Rating: moderate
References: #1114157 #1114169
Cross-References: CVE-2018-10851 CVE-2018-14626
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for pdns fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1566=1

Package List:

– openSUSE Leap 15.0 (x86_64):

pdns-4.1.2-lp150.3.6.1
pdns-backend-geoip-4.1.2-lp150.3.6.1
pdns-backend-geoip-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-godbc-4.1.2-lp150.3.6.1
pdns-backend-godbc-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-ldap-4.1.2-lp150.3.6.1
pdns-backend-ldap-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-lua-4.1.2-lp150.3.6.1
pdns-backend-lua-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-mydns-4.1.2-lp150.3.6.1
pdns-backend-mydns-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-mysql-4.1.2-lp150.3.6.1
pdns-backend-mysql-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-postgresql-4.1.2-lp150.3.6.1
pdns-backend-postgresql-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-remote-4.1.2-lp150.3.6.1
pdns-backend-remote-debuginfo-4.1.2-lp150.3.6.1
pdns-backend-sqlite3-4.1.2-lp150.3.6.1
pdns-backend-sqlite3-debuginfo-4.1.2-lp150.3.6.1
pdns-debuginfo-4.1.2-lp150.3.6.1
pdns-debugsource-4.1.2-lp150.3.6.1

References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4177-1
Rating: moderate
References: #1114157 #1114169 #1114170 #1116592
Cross-References: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644
CVE-2018-16855
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:

This update for pdns-recursor fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14644: Fixed denial of service via crafted query for meta-types
(bsc#1114170).
– CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).
– CVE-2018-16855: Fixed case where a crafted query could cause a denial of
service (bsc#1116592)

This update was imported from the openSUSE:Leap:15.0:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1570=1

Package List:

– openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

pdns-recursor-4.1.2-bp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://www.suse.com/security/cve/CVE-2018-14644.html
https://www.suse.com/security/cve/CVE-2018-16855.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169
https://bugzilla.suse.com/1114170
https://bugzilla.suse.com/1116592


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for pdns
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4175-1
Rating: moderate
References: #1114157 #1114169
Cross-References: CVE-2018-10851 CVE-2018-14626
Affected Products:
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for pdns fixes the following issues:

Security issues fixed:

– CVE-2018-10851: Fixed denial of service via crafted zone record or
crafted answer (bsc#1114157).
– CVE-2018-14626: Fixed packet cache pollution via crafted query
(bsc#1114169).

This update was imported from the openSUSE:Leap:15.0:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1571=1

Package List:

– openSUSE Backports SLE-15 (aarch64 ppc64le s390x x86_64):

pdns-4.1.2-bp150.2.3.1
pdns-backend-geoip-4.1.2-bp150.2.3.1
pdns-backend-godbc-4.1.2-bp150.2.3.1
pdns-backend-ldap-4.1.2-bp150.2.3.1
pdns-backend-lua-4.1.2-bp150.2.3.1
pdns-backend-mydns-4.1.2-bp150.2.3.1
pdns-backend-mysql-4.1.2-bp150.2.3.1
pdns-backend-postgresql-4.1.2-bp150.2.3.1
pdns-backend-remote-4.1.2-bp150.2.3.1
pdns-backend-sqlite3-4.1.2-bp150.2.3.1

References:

https://www.suse.com/security/cve/CVE-2018-10851.html
https://www.suse.com/security/cve/CVE-2018-14626.html
https://bugzilla.suse.com/1114157
https://bugzilla.suse.com/1114169


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2018-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ghostscript

Otkriveni su sigurnosni nedostaci u programskom paketu ghostscript za operacijski sustav Red Hat. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS...

Close