An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. Reference: https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html
Created pdns-recursor tracking bugs for this issue: Affects: epel-all [bug 1840192] Affects: fedora-all [bug 1840193]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.