SUSE 5024 Published by

A pdns security update has been released for openSUSE Leap 15.1.



security-announce: openSUSE-SU-2020:1556-1: moderate: Security update for pdns


openSUSE Security Update: Security update for pdns
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1556-1
Rating: moderate
References: #1156196 #1176312 #1176535
Cross-References: CVE-2020-17482
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:

This update for pdns fixes the following issues:

- Build with libmaxminddb instead of the obsolete GeoIP (boo#1156196)
- CVE-2020-17482: Fixed an error that can result in leaking of
uninitialised memory through crafted zone records (boo#1176535)
- Backported compilation fix vs. latest Boost 1.74 (boo#1176312)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2020-1556=1


Package List:

- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):

pdns-4.1.14-23.1
pdns-backend-godbc-4.1.14-23.1
pdns-backend-godbc-debuginfo-4.1.14-23.1
pdns-backend-ldap-4.1.14-23.1
pdns-backend-ldap-debuginfo-4.1.14-23.1
pdns-backend-lua-4.1.14-23.1
pdns-backend-lua-debuginfo-4.1.14-23.1
pdns-backend-mydns-4.1.14-23.1
pdns-backend-mydns-debuginfo-4.1.14-23.1
pdns-backend-mysql-4.1.14-23.1
pdns-backend-mysql-debuginfo-4.1.14-23.1
pdns-backend-postgresql-4.1.14-23.1
pdns-backend-postgresql-debuginfo-4.1.14-23.1
pdns-backend-remote-4.1.14-23.1
pdns-backend-remote-debuginfo-4.1.14-23.1
pdns-backend-sqlite3-4.1.14-23.1
pdns-backend-sqlite3-debuginfo-4.1.14-23.1
pdns-debuginfo-4.1.14-23.1
pdns-debugsource-4.1.14-23.1

References:

  https://www.suse.com/security/cve/CVE-2020-17482.html
  https://bugzilla.suse.com/1156196
  https://bugzilla.suse.com/1176312
  https://bugzilla.suse.com/1176535