First published: Tue Aug 23 2022(Updated: )
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | >=4.5.0<4.5.10 | |
PowerDNS Recursor | >=4.6.0<4.6.3 | |
PowerDNS Recursor | >=4.7.0<4.7.2 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this PowerDNS vulnerability is CVE-2022-37428.
The severity of CVE-2022-37428 is medium.
PowerDNS Recursor up to and including versions 4.5.9, 4.6.2, and 4.7.1 are affected by CVE-2022-37428.
Protobuf logging enables the vulnerability in PowerDNS Recursor by causing improper cleanup upon a thrown exception.
To fix CVE-2022-37428 in PowerDNS Recursor, update to version 4.5.10, 4.6.3, or 4.7.2, depending on your current version.