]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
rec: prep for rec-5.2.1 15397/head
authorOtto Moerbeek <otto.moerbeek@open-xchange.com>
Mon, 7 Apr 2025 11:06:10 +0000 (13:06 +0200)
committerOtto Moerbeek <otto.moerbeek@open-xchange.com>
Mon, 7 Apr 2025 12:30:26 +0000 (14:30 +0200)
.github/actions/spell-check/expect.txt
docs/secpoll.zone
pdns/recursordist/docs/changelog/5.2.rst
pdns/recursordist/docs/security-advisories/powerdns-advisory-2025-01.rst [new file with mode: 0644]

index 1af94f28fd0c7f11962fd2c2cb890927403eef51..26297ebeaa3d7587bc88568e1538234cf0b6ddbe 100644 (file)
@@ -588,6 +588,7 @@ ifportup
 ifurlextup
 ifurlup
 ihsinme
+Ilyin
 imenu
 Imhard
 incbin
@@ -1508,6 +1509,7 @@ Vixie
 vla
 Voegeli
 Volker
+Volodymyr
 voxel
 Vranken
 vulns
index fbde2a77cd58ae48d4a77ae20b157d84dbfdbbfc..4b8d9d165771a54592d1cf1b07b4784b453ea547 100644 (file)
@@ -1,4 +1,4 @@
-@       86400   IN  SOA pdns-public-ns1.powerdns.com. peter\.van\.dijk.powerdns.com. 2025031801 10800 3600 604800 10800
+@       86400   IN  SOA pdns-public-ns1.powerdns.com. peter\.van\.dijk.powerdns.com. 2025040701 10800 3600 604800 10800
 @       3600    IN  NS  pdns-public-ns1.powerdns.com.
 @       3600    IN  NS  pdns-public-ns2.powerdns.com.
 
@@ -403,10 +403,11 @@ recursor-5.1.0.security-status                          60 IN TXT "3 Upgrade now
 recursor-5.1.1.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-04.html"
 recursor-5.1.2.security-status                          60 IN TXT "1 OK"
 recursor-5.1.3.security-status                          60 IN TXT "1 OK"
-recursor-5.2.0-alpha1.security-status                   60 IN TXT "1 Unsupported pre-release"
-recursor-5.2.0-beta1.security-status                    60 IN TXT "1 Unsupported pre-release"
-recursor-5.2.0-rc1.security-status                      60 IN TXT "1 Unsupported pre-release"
-recursor-5.2.0.security-status                          60 IN TXT "1 OK"
+recursor-5.2.0-alpha1.security-status                   60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
+recursor-5.2.0-beta1.security-status                    60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
+recursor-5.2.0-rc1.security-status                      60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
+recursor-5.2.0.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-01.html"
+recursor-5.2.1.security-status                          60 IN TXT "1 OK"
 
 ; Recursor Debian
 recursor-3.6.2-2.debian.security-status                 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/3/security/powerdns-advisory-2015-01/ and https://doc.powerdns.com/3/security/powerdns-advisory-2016-02/"
index 4d4a02c165102be03fed134082bf1820029eaac5..eeae5347d52ccaa80f6ff0b3eb6564b15f65cc70 100644 (file)
@@ -3,6 +3,16 @@ Changelogs for 5.2.X
 
 Before upgrading, it is advised to read the :doc:`../upgrade`.
 
+.. changelog::
+  :version: 5.2.1
+  :released: 7th of April 2025
+
+  .. change::
+    :tags: Bug Fixes
+    :pullreq: 15396
+
+    Fix PowerDNS Security Advisory 2025-01 (CVE-2025-30195): A crafted zone can lead to an illegal memory access in the Recursor.
+
 .. changelog::
   :version: 5.2.0
   :released: 14th of January 2025
diff --git a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2025-01.rst b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2025-01.rst
new file mode 100644 (file)
index 0000000..d287d5c
--- /dev/null
@@ -0,0 +1,22 @@
+PowerDNS Security Advisory 2025-01: A crafted zone can lead to an illegal memory access in the Recursor
+=======================================================================================================
+
+- CVE: CVE-2025-30195
+- Date: 7th of April 2025.
+- Affects: PowerDNS Recursor 5.2.0
+- Not affected: PowerDNS Recursor 5.2.1 and versions before 5.2.0
+- Severity: High
+- Impact: Denial of service
+- Exploit: This problem can be triggered by an attacker publishing a crafted zone
+- Risk of system compromise: None
+- Solution: Upgrade to patched version
+
+
+An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.
+
+CVSS Score: 7.5, see
+https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1
+
+The remedy is: upgrade to the patched 5.2.1 version.
+
+We would like to thank Volodymyr Ilyin for bringing this issue to our attention.