Rebase to Knot DNS 2.8.2 and Knot Resolver 4.1.0

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by tkrizek.

a year ago

This update test gating status has been changed to 'waiting'.

a year ago

This update test gating status has been changed to 'ignored'.

a year ago

This update has been pushed to testing.

a year ago

tkrizek edited this update.

a year ago

This update can be pushed to stable now if the maintainer wishes

a year ago

This update's test gating status has been changed to 'greenwave_failed'.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has been submitted for stable by tkrizek.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
modified
a year ago
BZ#1727208 CVE-2019-10190 knot-resolver: improper input validation in DNS resolver allows remote attacker to bypass DNSSEC validation
0
0
BZ#1727211 CVE-2019-10191 knot-resolver: improper input validation in DNS resolver allows remote attacker to poison cache by unsigned negative answer
0
0
BZ#1729825 CVE-2019-10190 knot-resolver: improper input validation in DNS resolver allows remote attacker to bypass DNSSEC validation [epel-7]
0
0
BZ#1729827 CVE-2019-10191 knot-resolver: improper input validation in DNS resolver allows remote attacker to poison cache by unsigned negative answer [epel-7]
0
0

Automated Test Results