Rebase to Knot DNS 2.8.2 and Knot Resolver 4.1.0

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by tkrizek.

11 months ago

This update test gating status has been changed to 'waiting'.

11 months ago

This update test gating status has been changed to 'ignored'.

11 months ago

This update has been pushed to testing.

11 months ago

tkrizek edited this update.

11 months ago

This update can be pushed to stable now if the maintainer wishes

11 months ago

This update's test gating status has been changed to 'greenwave_failed'.

10 months ago

This update's test gating status has been changed to 'ignored'.

10 months ago

This update has been submitted for stable by tkrizek.

10 months ago

This update has been pushed to stable.

10 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Dates
submitted
11 months ago
in testing
11 months ago
in stable
10 months ago
modified
11 months ago
BZ#1727208 CVE-2019-10190 knot-resolver: improper input validation in DNS resolver allows remote attacker to bypass DNSSEC validation
0
0
BZ#1727211 CVE-2019-10191 knot-resolver: improper input validation in DNS resolver allows remote attacker to poison cache by unsigned negative answer
0
0
BZ#1729825 CVE-2019-10190 knot-resolver: improper input validation in DNS resolver allows remote attacker to bypass DNSSEC validation [epel-7]
0
0
BZ#1729827 CVE-2019-10191 knot-resolver: improper input validation in DNS resolver allows remote attacker to poison cache by unsigned negative answer [epel-7]
0
0

Automated Test Results