|
|
Subscribe / Log in / New account

Mageia alert MGASA-2017-0036 (pdns-recursor)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2017-0036: Updated pdns-recursor packages fix security vulnerability
Date:  Thu, 2 Feb 2017 20:17:47 +0100
Message-ID:  <20170202191747.7496C9F7CC@duvel.mageia.org>

MGASA-2017-0036 - Updated pdns-recursor packages fix security vulnerability Publication date: 02 Feb 2017 URL: http://advisories.mageia.org/MGASA-2017-0036.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7068 Description: Florian Heinz and Martin Kluge reported that pdns-recursor parses all records present in a query regardless of whether they are needed or even legitimate, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the pdns server, resulting in a partial denial of service if the system becomes overloaded (CVE-2016-7068). References: - https://bugs.mageia.org/show_bug.cgi?id=20127 - https://doc.powerdns.com/md/security/powerdns-advisory-20... - https://www.debian.org/security/2017/dsa-3763 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068 SRPMS: - 5/core/pdns-recursor-3.6.4-1.1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds