~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-15090

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-15090
2
 
PublicDate: 2018-01-23
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15090
5
 
 https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html
6
 
 https://downloads.powerdns.com/patches/2017-03/
7
 
Description:
8
 
 An issue has been found in the DNSSEC validation component of PowerDNS
9
 
 Recursor from 4.0.0 and up to and including 4.0.6, where the signatures
10
 
 might have been accepted as valid even if the signed data was not in
11
 
 bailiwick of the DNSKEY used to sign it. This allows an attacker in
12
 
 position of man-in-the-middle to alter the content of records by issuing a
13
 
 valid signature for the crafted records.
14
 
Ubuntu-Description:
15
 
Notes:
16
 
Bugs:
17
 
Priority: untriaged
18
 
Discovered-by:
19
 
Assigned-to:
20
 
 
21
 
 
22
 
Patches_pdns-recursor:
23
 
upstream_pdns-recursor: released (4.0.7-1)
24
 
precise/esm_pdns-recursor: DNE
25
 
trusty_pdns-recursor: needs-triage
26
 
xenial_pdns-recursor: needs-triage
27
 
zesty_pdns-recursor: ignored (reached end-of-life)
28
 
artful_pdns-recursor: needs-triage
29
 
bionic_pdns-recursor: needs-triage
30
 
devel_pdns-recursor: needs-triage