[Bug 247707] dns/powerdns-recursor: update to 4.3.2
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Thu Jul 2 08:44:36 UTC 2020
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=247707
Bug ID: 247707
Summary: dns/powerdns-recursor: update to 4.3.2
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Some People
Priority: ---
Component: Individual Port(s)
Assignee: ports-bugs at FreeBSD.org
Reporter: tremere at cainites.net
Created attachment 216129
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=216129&action=edit
Update to PowerDNS Recursor 4.3.2
This update contains a security fix for CVE-2020-14196.
The issue is:
CVE-2020-14196: An issue has been found in PowerDNS Recursor where the ACL
applied to the internal web server via webserver-allow-from is not properly
enforced, allowing a remote attacker to send HTTP queries to the internal web
server, bypassing the restriction.
In the default configuration the API webserver is not enabled. Only
installations using a non-default value for webserver and webserver-address are
affected.
As usual, there were also other smaller enhancements and bugfixes. In
particular, the 4.3.2 release contains fixes that allow long CNAME chains to
resolve properly, where previously they could fail if qname minimization is
enabled.
QA:
portlint: OK (looks fine.)
testport: OK (12.1, amd64)
Removed file(s):
files/patch-hostnamemax (no longer necessary since it has been merged by
upstream)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list