]> git.ipfire.org Git - thirdparty/pdns.git/commitdiff
Merge pull request #7593 from aerique/feature/update-for-changelog-and-secpoll-for...
authoraerique <aerique@xs4all.nl>
Mon, 18 Mar 2019 19:56:57 +0000 (20:56 +0100)
committerGitHub <noreply@github.com>
Mon, 18 Mar 2019 19:56:57 +0000 (20:56 +0100)
Update changelog, secpoll and advisories for auth-4.0.7 and auth-4.1.7.

docs/changelog/4.0.rst
docs/changelog/4.1.rst
docs/secpoll.zone
docs/security-advisories/powerdns-advisory-2019-03.rst [new file with mode: 0644]

index a0c11453b916a369024380365c11abd6478e06cb..d230886809144e06510f521fa956adec3c954fc7 100644 (file)
@@ -1,6 +1,20 @@
 Changelogs for 4.0.x
 ====================
 
+PowerDNS Authoritative Server 4.0.7
+-----------------------------------
+
+Released 18th of March 2019
+
+This release fixes PowerDNS Security Advisory
+:doc:`2019-03 <../security-advisories/powerdns-advisory-2019-03>`: Insufficient validation in the HTTP remote backend (CVE-2019-3871)
+
+Bug fixes
+~~~~~~~~~
+
+- `#7582 <https://github.com/PowerDNS/pdns/pull/7582>`__: Insufficient validation in the HTTP remote backend (CVE-2019-3871)
+
+
 PowerDNS Authoritative Server 4.0.6
 -----------------------------------
 
index 18e400a79781bab858de3e89d35956c74e276bac..ac1236b6364f105fa0fb2c32dea1ed6ada19e040 100644 (file)
@@ -1,6 +1,20 @@
 Changelogs for 4.1.x
 ====================
 
+.. changelog::
+  :version: 4.1.7
+  :released: March 18th 2019
+
+  This release fixes the following security advisory:
+
+  - PowerDNS Security Advisory :doc:`2019-03 <../security-advisories/powerdns-advisory-2019-03>` (CVE-2019-3871)
+
+  .. change::
+    :tags: Bug Fixes
+    :pullreq: 7577
+
+    Insufficient validation in the HTTP remote backend (CVE-2019-3871, PowerDNS Security Advisory :doc:`2019-03 <../security-advisories/powerdns-advisory-2019-03>`)
+
 .. changelog::
   :version: 4.1.6
   :released: January 31st 2019
index fca45e4721752a635f6f8a8ccdbbcea18bb63f7b..400790aa8e91d50a00b4d80ef38a8d5e0dc739fa 100644 (file)
@@ -1,4 +1,4 @@
-@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2019022801 10800 3600 604800 10800
+@       86400   IN  SOA pdns-public-ns1.powerdns.com. pieter\.lexis.powerdns.com. 2019031801 10800 3600 604800 10800
 @       3600    IN  NS  pdns-public-ns1.powerdns.com.
 @       3600    IN  NS  pdns-public-ns2.powerdns.com.
 ; Auth
@@ -31,7 +31,8 @@ auth-4.0.3.security-status                              60 IN TXT "3 Upgrade now
 auth-4.0.4-rc1.security-status                          60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2017-04.html"
 auth-4.0.4.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2017-04.html"
 auth-4.0.5.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html"
-auth-4.0.6.security-status                              60 IN TXT "1 OK"
+auth-4.0.6.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
+auth-4.0.7.security-status                              60 IN TXT "1 OK"
 auth-4.1.0-rc1.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
 auth-4.1.0-rc2.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
 auth-4.1.0-rc3.security-status                          60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
@@ -40,8 +41,9 @@ auth-4.1.1.security-status                              60 IN TXT "3 Upgrade now
 auth-4.1.2.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"
 auth-4.1.3.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"
 auth-4.1.4.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"
-auth-4.1.5.security-status                              60 IN TXT "1 OK"
-auth-4.1.6.security-status                              60 IN TXT "1 OK"
+auth-4.1.5.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
+auth-4.1.6.security-status                              60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html"
+auth-4.1.7.security-status                              60 IN TXT "1 OK"
 auth-4.2.0-alpha1.security-status                       60 IN TXT "1 OK"
 auth-4.2.0-beta1.security-status                        60 IN TXT "1 OK"
 
diff --git a/docs/security-advisories/powerdns-advisory-2019-03.rst b/docs/security-advisories/powerdns-advisory-2019-03.rst
new file mode 100644 (file)
index 0000000..2f84dd9
--- /dev/null
@@ -0,0 +1,34 @@
+PowerDNS Security Advisory 2019-03: Insufficient validation in the HTTP remote backend
+======================================================================================
+
+-  CVE: CVE-2019-3871
+-  Date: March 18th 2019
+-  Affects: PowerDNS Authoritative up to and including 4.1.6
+-  Not affected: 4.1.7, 4.0.7
+-  Severity: High
+-  Impact: Denial of Service, Information Disclosure, Content spoofing
+-  Exploit: This problem can be triggered via crafted queries
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+
+An issue has been found in PowerDNS Authoritative Server when the
+HTTP remote backend is used in RESTful mode (without post=1 set),
+allowing a remote user to cause the HTTP backend to connect to
+an attacker-specified host instead of the configured one, via a
+crafted DNS query.
+This can be used to cause a denial of service by preventing the remote
+backend from getting a response, content spoofing if the attacker can
+time its own query so that subsequent queries will use an attacker-controlled
+HTTP server instead of the configured one, and possibly information
+disclosure if the Authoritative Server has access to internal servers.
+
+This issue has been assigned CVE-2019-3871.
+
+PowerDNS Authoritative up to and including 4.1.6 is affected.
+Please note that at the time of writing, PowerDNS Authoritative 3.4 and
+below are no longer supported, as described in 
+https://doc.powerdns.com/authoritative/appendices/EOL.html.
+
+We would like to thank Adam Dobrawy, Frederico Silva and Gregory
+Brzeski from HyperOne.com for finding and subsequently reporting 
+this issue!