[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 6045-1] pdns-recursor security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-6045-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 29, 2025                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : pdns-recursor
CVE ID         : CVE-2025-59023 CVE-2025-59024

Two vulnerabiliites have been discovered in PDNS Recursor, a resolving
name server: Delegation information was insufficiently validated, which
could result in cache pollution.

These changes are too intrusive to be backported to the version of
the PDNS recursor in the oldstable distribution (bookworm). For
affected setups an update to Debian stable/trixie is recommended,
no further security updates for pdns-recursor in Bookworm will be issued.

For the stable distribution (trixie), these problems have been fixed in
version 5.2.6-0+deb13u1.

We recommend that you upgrade your pdns-recursor packages.

For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=j3Ku
-----END PGP SIGNATURE-----


Reply to: