-@ 86400 IN SOA pdns-public-ns1.powerdns.com. peter\.van\.dijk.powerdns.com. 2026012901 10800 3600 604800 10800
+@ 86400 IN SOA pdns-public-ns1.powerdns.com. peter\.van\.dijk.powerdns.com. 2026020901 10800 3600 604800 10800
@ 3600 IN NS pdns-public-ns1.powerdns.com.
@ 3600 IN NS pdns-public-ns2.powerdns.com.
recursor-5.1.6.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html"
recursor-5.1.7.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html"
recursor-5.1.8.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html"
-recursor-5.1.9.security-status 60 IN TXT "1 OK"
+recursor-5.1.9.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html"
+recursor-5.1.10.security-status 60 IN TXT "1 OK"
recursor-5.2.0-alpha1.security-status 60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
recursor-5.2.0-beta1.security-status 60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
recursor-5.2.4.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html"
recursor-5.2.5.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html"
recursor-5.2.6.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html"
-recursor-5.2.7.security-status 60 IN TXT "1 OK"
+recursor-5.2.7.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html"
+recursor-5.2.8.security-status 60 IN TXT "1 OK"
recursor-5.3.0-alpha1.security-status 60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
recursor-5.3.0-alpha2.security-status 60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
recursor-5.3.0.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-06.html"
recursor-5.3.1.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-07.html"
recursor-5.3.2.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html"
-recursor-5.3.3.security-status 60 IN TXT "1 OK"
-recursor-5.3.4.security-status 60 IN TXT "1 OK"
-recursor-5.4.0-alpha1.security-status 60 IN TXT "2 Superseded pre-release"
-recursor-5.4.0-beta1.security-status 60 IN TXT "1 Unsupported pre-release"
+recursor-5.3.3.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html"
+recursor-5.3.4.security-status 60 IN TXT "3 Upgrade now, see https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html"
+recursor-5.3.5.security-status 60 IN TXT "1 OK"
+recursor-5.4.0-alpha1.security-status 60 IN TXT "3 Superseded pre-release (known vulnerabilities)"
+recursor-5.4.0-beta1.security-status 60 IN TXT "3 Unsupported pre-release (known vulnerabilities)"
; Recursor Debian
recursor-3.6.2-2.debian.security-status 60 IN TXT "3 Upgrade now, see https://docs.powerdns.com/recursor/appendices/EOL.html"
--- /dev/null
+PowerDNS Security Advisory 2026-01: Crafted zones can lead to increased resource usage in Recursor
+==================================================================================================
+
+- CVE: CVE-2026-24027
+- Date: 9th February 2026
+- Affects: PowerDNS Recursor up and including to 5.1.9, 5.2.7 and 5.3.4
+- Not affected: PowerDNS Recursor 5.1.10, 5.2.8 and 5.3.5
+- Severity: Medium
+- Impact: Denial of Service
+- Exploit: This problem can be triggered by publishing and querying a crafted zone that causes increased incoming network traffic.
+- Risk of system compromise: None
+- Solution: Upgrade to patched version
+
+CVSS Score: 5.3, see
+https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1
+
+The remedy is: upgrade to a patched version.
+
+We would like to thank Shuhan Zhang from Tsinghua University for bringing this issue to our attention.
+
+- CVE: CVE-2026-0398
+- Date: 9th February 2026
+- Affects: PowerDNS Recursor up and including to 5.1.9, 5.2.7 and 5.3.4
+- Not affected: PowerDNS Recursor 5.1.10, 5.2.8 and 5.3.5
+- Severity: Medium
+- Impact: Denial of Service
+- Exploit: This problem can be triggered by publishing and querying a crafted zone that causes large memory usage.
+- Risk of system compromise: None
+- Solution: Upgrade to patched version
+
+CVSS Score: 5.3, see
+https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1
+
+The remedy is: upgrade to a patched version.
+
+We would like to thank Yufan You from Tsinghua University for bringing this issue to our attention.
+
+We would also like to thank TaoFei Guo from Peking University and Yang Luo, JianJun Chen from
+Tsinghua University for bringing an issue of caching irrelevant records related to CNAME chains to
+our attention.