ASA-202107-73 log generated external raw

[ASA-202107-73] powerdns: denial of service
Arch Linux Security Advisory ASA-202107-73 ========================================== Severity: Medium Date : 2021-07-27 CVE-ID : CVE-2021-36754 Package : powerdns Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-2222 Summary ======= The package powerdns before version 4.5.1-1 is vulnerable to denial of service. Resolution ========== Upgrade to 4.5.1-1. # pacman -Syu "powerdns>=4.5.1-1" The problem has been fixed upstream in version 4.5.1. Workaround ========== Users that cannot upgrade immediately, but do have dnsdist in place, can use dnsdist to filter such queries before they do harm, with something like addAction(QTypeRule(65535), RCodeAction(DNSRCode.REFUSED)). Description =========== PowerDNS Authoritative Server 4.5.0 will crash with an uncaught out of bounds exception if it receives a query with QTYPE 65535. The offending code was not present in earlier versions, and they are not affected. Users that cannot upgrade immediately, but do have dnsdist in place, can use dnsdist to filter such queries before they do harm, with something like addAction(QTypeRule(65535), RCodeAction(DNSRCode.REFUSED)). When the PowerDNS Authoritative Server is run inside a supervisor like supervisord or systemd, an uncaught exception crash will lead to an automatic restart, limiting the impact to a somewhat degraded service. Impact ====== A remote attacker could crash the DNS server with a crafted query. References ========== https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2021-01.html https://downloads.powerdns.com/patches/2021-01/pdns-4.5.0-2021-01.patch https://github.com/PowerDNS/pdns/commit/96cae2fd21054b383a16c569a363a50f71808cd9 https://security.archlinux.org/CVE-2021-36754