Upstream reports a bug in PowerDNS DNS packet parsing/generation code, which, when exploited, can cause a crash of individual threads (disabling service) or crash of whole processes (allowing a supervisor to restart them) with just one or a few query packets. PowerDNS Authoritative Server 3.4.0-3.4.5 are affected. No other versions are affected. The PowerDNS Recursor is not affected. Upstream patches: https://github.com/PowerDNS/pdns/commit/c849701f7be442b21db69366d00cd92b64d660cd https://github.com/PowerDNS/pdns/commit/8c91e2ccd0c775405b3c3dc0cb576106924ae364
Public via: http://seclists.org/oss-sec/2015/q3/476
Created pdns tracking bugs for this issue: Affects: fedora-all [bug 1259603]
Patches from the advisory: https://downloads.powerdns.com/patches/2015-02/
pdns-3.4.6-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
pdns-3.4.6-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
pdns-3.4.6-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.