openSUSE Security Update: Security update for pdns-recursor ______________________________________________________________________________ Announcement ID: openSUSE-SU-2024:0048-1 Rating: important References: #1209897 #1219823 #1219826 Cross-References: CVE-2023-26437 CVE-2023-50387 CVE-2023-50868 CVSS scores: CVE-2023-26437 (NVD) : 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L CVE-2023-50387 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2023-50868 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for pdns-recursor fixes the following issues: Update to 4.8.6: * fixes case when crafted DNSSEC records in a zone can lead to a denial of service in Recursor https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-202 4-01.html (boo#1219823, boo#1219826, CVE-2023-50387, CVE-2023-50868) Changes in 4.8.5: * (I)XFR: handle partial read of len prefix. * YaHTTP: Prevent integer overflow on very large chunks. * Fix setting of policy tags for packet cache hits. Changes in 4.8.4: * Deterred spoofing attempts can lead to authoritative servers being marked unavailable (boo#1209897, CVE-2023-26437) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-48=1 Package List: - openSUSE Backports SLE-15-SP5 (aarch64 ppc64le x86_64): pdns-recursor-4.8.6-bp155.2.3.1 References: https://www.suse.com/security/cve/CVE-2023-26437.html https://www.suse.com/security/cve/CVE-2023-50387.html https://www.suse.com/security/cve/CVE-2023-50868.html https://bugzilla.suse.com/1209897 https://bugzilla.suse.com/1219823 https://bugzilla.suse.com/1219826