<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for pdns-recursor</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0131-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-02-04T12:59:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-02-04T12:59:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-02-04T12:59:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for pdns-recursor</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for pdns-recursor to version 4.1.10 fixes the following issues:

Security issues fixed:

- CVE-2019-3806: Fixed a case when Lua hooks are not called over TCP (boo#1121887)
- CVE-2019-3807: Fixed an issue where DNSSEC validation was not performed for AA=0 responses (boo#1121889)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-131</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ/#LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0131-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121887</URL>
      <Description>SUSE Bug 1121887</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1121889</URL>
      <Description>SUSE Bug 1121889</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3806/</URL>
      <Description>SUSE CVE CVE-2019-3806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-3807/</URL>
      <Description>SUSE CVE CVE-2019-3807 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 12 SP1">
        <FullProductName ProductID="SUSE Package Hub 12 SP1" CPE="cpe:/o:suse:packagehub:12:sp1">SUSE Package Hub 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="pdns-recursor-4.1.10-16.1">
      <FullProductName ProductID="pdns-recursor-4.1.10-16.1">pdns-recursor-4.1.10-16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="pdns-recursor-4.1.10-16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:pdns-recursor-4.1.10-16.1">pdns-recursor-4.1.10-16.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua.</Note>
    </Notes>
    <CVE>CVE-2019-3806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:pdns-recursor-4.1.10-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ/#LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3806.html</URL>
        <Description>CVE-2019-3806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121887</URL>
        <Description>SUSE Bug 1121887</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.</Note>
    </Notes>
    <CVE>CVE-2019-3807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:pdns-recursor-4.1.10-16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ/#LWT54KXW3PC2R7C5X6T7EOO7G2AIPPBJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-3807.html</URL>
        <Description>CVE-2019-3807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121889</URL>
        <Description>SUSE Bug 1121889</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
