openSUSE-SU-2022:10171-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2022:10171-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/openSUSE-SU-2022:10171-1
Related
Published
2022-10-30T15:07:10Z
Modified
2022-10-30T15:07:10Z
Summary
Security update for pdns-recursor
Details

This update for pdns-recursor fixes the following issues:

pdns-recursor was updated to 4.6.3:

  • fixes incomplete exception handling related to protobuf message generation (boo#1202664, CVE-2022-37428)

pdns-recursor was updated to 4.6.2:

  • Reject non-apex NSEC(3)s that have both the NS and SOA bits set
  • A CNAME answer on DS query should abort DS retrieval
  • Allow disabling of processing the root hints
  • If we get NODATA on an AAAA in followCNAMERecords, try native dns64
References

Affected packages

SUSE:Package Hub 15 SP4 / pdns-recursor

Package

Name
pdns-recursor
Purl
pkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2015%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.3-bp154.2.3.1

Ecosystem specific

{
    "binaries": [
        {
            "pdns-recursor": "4.6.3-bp154.2.3.1"
        }
    ]
}

openSUSE:Leap 15.4 / pdns-recursor

Package

Name
pdns-recursor
Purl
pkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Leap%2015.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.3-bp154.2.3.1

Ecosystem specific

{
    "binaries": [
        {
            "pdns-recursor": "4.6.3-bp154.2.3.1"
        }
    ]
}