]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
Merge pull request #7388 from rgacogne/fix-boost-random-header
authorPieter Lexis <pieterlexis@users.noreply.github.com>
Mon, 21 Jan 2019 14:01:18 +0000 (15:01 +0100)
committerGitHub <noreply@github.com>
Mon, 21 Jan 2019 14:01:18 +0000 (15:01 +0100)
Move UUID generators to a common function, fix boost 1.69.0 warning

build-scripts/jsoref-spellchecker/whitelist.words
docs/secpoll.zone
pdns/recursordist/docs/changelog/4.1.rst
pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-01.rst [new file with mode: 0644]
pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-02.rst [new file with mode: 0644]

index 4a073226d29717002bea07292c366aa4542b1b9b..60c0e86f2e23088b382f0b29eb689afda8acdc82 100644 (file)
@@ -8237,6 +8237,7 @@ theirserial
 thel
 thelog
 ther
+Thessalonikefs
 Thfrt
 THg
 Thiago
index 7f0e805360c0bfe11bff6adc9b06accf9ba48dd5..70c87e65aa4747cf12d83412639350a40cd8a099 100644 (file)
@@ -1,4 +1,4 @@
-@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2018121401 10800 3600 604800 10800
+@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2019012101 10800 3600 604800 10800
 @       3600    IN  NS  pdns-public-ns1.powerdns.com.
 @       3600    IN  NS  pdns-public-ns2.powerdns.com.
 ; Auth
@@ -170,7 +170,8 @@ recursor-4.1.4.security-status                          60 IN TXT "3 Upgrade now
 recursor-4.1.5.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html"
 recursor-4.1.6.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html"
 recursor-4.1.7.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html"
-recursor-4.1.8.security-status                          60 IN TXT "1 OK"
+recursor-4.1.8.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html"
+recursor-4.1.9.security-status                          60 IN TXT "1 OK"
 
 ; Recursor Debian
 recursor-3.6.2-2.debian.security-status                 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/3/security/powerdns-advisory-2015-01/ and https://doc.powerdns.com/3/security/powerdns-advisory-2016-02/"
index e7e3abfd3c285cd3181ec980ebe6b4aa6aed2a40..217b7d279bdc842f24b6f86df490da28f49aed01 100644 (file)
@@ -1,6 +1,31 @@
 Changelogs for 4.1.x
 ====================
 
+.. changelog::
+  :version: 4.1.9
+  :released: 21st of January 2019
+
+  This release fixes :doc:`Security Advisory 2019-01 <../security-advisories/powerdns-advisory-2019-01>` and :doc:`Security Advisory 2019-02 <../security-advisories/powerdns-advisory-2019-02>` that were recently discovered, affecting PowerDNS Recursor:
+   - CVE-2019-3806, 2019-01: from 4.1.4 up to and including 4.1.8 ;
+   - CVE-2019-3807, 2019-02: from 4.1.0 up to and including 4.1.8.
+
+  The issues are:
+    - CVE-2019-3806, 2019-01: Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua ;
+    - CVE-2019-3807, 2019-02: records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.
+
+  .. change::
+    :tags: Bug Fixes
+    :pullreq: 7397
+
+    Properly apply Lua hooks to TCP queries, even with pdns-distributes-queries set (CVE-2019-3806, PowerDNS Security Advisory :doc:`2018-01 <../security-advisories/powerdns-advisory-2019-01>`). Validates records in the answer section of responses with AA=0 (CVE-2019-3807, PowerDNS Security Advisory :doc:`2019-02 <../security-advisories/powerdns-advisory-2019-02>`).
+
+  .. change::
+    :tags: Improvements
+    :pullreq: 7377
+    :tickets: 7383
+
+    Try another worker before failing if the first pipe was full
+
 .. changelog::
   :version: 4.1.8
   :released: 26th of November 2018
diff --git a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-01.rst b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-01.rst
new file mode 100644 (file)
index 0000000..f7e885e
--- /dev/null
@@ -0,0 +1,27 @@
+PowerDNS Security Advisory 2019-01: Lua hooks are not applied in certain configurations
+=======================================================================================
+
+-  CVE: CVE-2019-3806
+-  Date: 21st of January 2019
+-  Affects: PowerDNS Recursor from 4.1.4 up to and including 4.1.8
+-  Not affected: 4.0.x, 4.1.0 up to and including 4.1.3, 4.1.9
+-  Severity: Low
+-  Impact: Access restriction bypass
+-  Exploit: This problem can be triggered via TCP queries
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+-  Workaround: Switch to pdns-distributes-queries=no
+
+An issue has been found in PowerDNS Recursor where Lua hooks are not properly
+applied to queries received over TCP in some specific combination of settings,
+possibly bypassing security policies enforced using Lua.
+
+When the recursor is configured to run with more than one thread (threads=X)
+and to do the distribution of incoming queries to the worker threads itself
+(pdns-distributes-queries=yes), the Lua script is not properly loaded in
+the thread handling incoming TCP queries, causing the Lua hooks to not be
+properly applied.
+
+This issue has been assigned CVE-2019-3806 by Red Hat.
+
+PowerDNS Recursor from 4.1.4 up to and including 4.1.8 is affected.
diff --git a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-02.rst b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2019-02.rst
new file mode 100644 (file)
index 0000000..a5ccb99
--- /dev/null
@@ -0,0 +1,24 @@
+PowerDNS Security Advisory 2019-02: Insufficient validation of DNSSEC signatures
+================================================================================
+
+-  CVE: CVE-2019-3807
+-  Date: 21st of January 2019
+-  Affects: PowerDNS Recursor from 4.1.0 up to and including 4.1.8
+-  Not affected: 4.0.x, 4.1.9
+-  Severity: Medium
+-  Impact: Insufficient validation
+-  Exploit: This problem can be triggered via crafted responses
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+
+An issue has been found in PowerDNS Recursor where records in the answer
+section of responses received from authoritative servers with the AA flag
+not set were not properly validated, allowing an attacker to bypass DNSSEC
+validation.
+
+This issue has been assigned CVE-2019-3807 by Red Hat.
+
+PowerDNS Recursor from 4.1.0 up to and including 4.1.8 is affected.
+
+We would like to thank Ralph Dolmans and George Thessalonikefs of NLNetLabs
+for finding and subsequently reporting this issue!